Get my own profile
Public access
View all10 articles
30 articles
available
not available
Based on funding mandates
Co-authors
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Claudio BettiniUniversità degli Studi di MilanoVerified email at unimi.it
- Peng NingGoogleVerified email at google.com
- Sergio MascettiUniversità degli Studi di MilanoVerified email at unimi.it
- Alexander BrodskyProfessor, Department of Computer Science, George Mason UniversityVerified email at gmu.edu
- Like GaoTigerGraph IncVerified email at tigergraph.com
- Dario FreniGoogleVerified email at google.com
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
- Weili HanFudan UniversityVerified email at fudan.edu.cn
- Byung Suk LeeProfessor of Computer Science, University of VermontVerified email at uvm.edu
- Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
- Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
- Yuan ZhangProfessor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- cliff wangNCSUVerified email at ncsu.edu
- Min WangGoogle ResearchVerified email at google.com
- Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
- Zhen HeAssociate Professor, La Trobe UniversityVerified email at latrobe.edu.au
- Yan Huang (黄艳)Regents Professor, Computer Science and Engineering, University of North TexasVerified email at unt.edu
- Lei ChenHong Kong University of Science and TechnologyVerified email at cse.ust.hk
- V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
Follow