Get my own profile
Public access
View all11 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Douglas ReevesProfessor of Computer Science, N.C. State UniversityVerified email at ncsu.edu
Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityVerified email at ncsu.edu
Yao LiuAssociate Professor of Computer Science, University of South FloridaVerified email at cse.usf.edu
Wenliang DuSyracuse UniversityVerified email at ecs.syr.edu
An LiuSamsung Research AmericaVerified email at samsung.com
Ahmed M. AzabFacebookVerified email at fb.com
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Wenbo ShenZhejiang UniversityVerified email at zju.edu.cn
cliff wangNCSUVerified email at ncsu.edu
Kun SunGeorge Mason UniversityVerified email at gmu.edu
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Ruowen WangGoogle, Samsung Research America, North Carolina State UniversityVerified email at google.com
Attila A YavuzAssociate Professor, University of South FloridaVerified email at usf.edu
Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
Yuan ZhangAssociate Professor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Wu ZhouDidi LabsVerified email at didichuxing.com
Jia MaSamsung Research AmericaVerified email at samsung.com
William EnckProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu