Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
- Lei XuComputer Science Department, Kent State UniversityVerified email at kent.edu
- Kalikinkar MandalAssistant Professor at University of New Brunswick, FrederictonVerified email at uwaterloo.ca
- Weidong ShiUniversity of HoustonVerified email at uh.edu
- Lin ChenDepartment of computer science, Zhejiang UniversityVerified email at zju.edu.cn
- Daniel EngelsVerified email at alum.mit.edu
- Zhimin GaoAuburn University at MontgomeryVerified email at aum.edu
- Bo ZhuUniversity of WaterlooVerified email at uwaterloo.ca
- Boyang WangUniversity of CincinnatiVerified email at uc.edu
- Francesco SicaFlorida Atlantic UniversityVerified email at fau.edu
- David JaoUniversity of WaterlooVerified email at uwaterloo.ca
- Qingji ZhengVerified email at my.utsa.edu
- Lei YangAmazonVerified email at amazon.com
- Raullen ChaiUniversity of WaterlooVerified email at engmail.uwaterloo.ca
- Gangqiang YangUniversity of WaterlooVerified email at uwaterloo.ca
- Teng WuECE, university of waterlooVerified email at uwaterloo.ca
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- Berry SchoenmakersAssociate Professor, TU EindhovenVerified email at tue.nl
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de