Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Teryl TaylorResearch Staff Member, IBM ResearchVerified email at ibm.com
Marc Ph. StoecklinIBM ResearchVerified email at zurich.ibm.com
Kevin W. HamlenLouis A. Beecherl, Jr. Distinguished Professor of Computer Science, The University of Texas atVerified email at utdallas.edu
Jiyong JangResearch Scientist, IBM ResearchVerified email at us.ibm.com
Douglas SchalesSTSM, IBM ResearchVerified email at us.ibm.com
Xiaokui ShuIBM ResearchVerified email at ibm.com
Latifur KhanProfessor, University of Texas at DallasVerified email at utdallas.edu
gbadebo ayoadeResearch Assistant University of Texas DallasVerified email at utdallas.edu
Jialong ZhangByteDance AI LabVerified email at bytedance.com
Junia ValenteToyota Tsusho Systems US, Inc.Verified email at toyota.com
Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
Mohammad Al-ZinatiDepartment of Software Engineering, Jordan University of Science and TechnologyVerified email at just.edu.jo
Josyula Ramachandra RaoIBM ResearchVerified email at us.ibm.com
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Subbarao KambhampatiArizona State UniversityVerified email at asu.edu
Adam DoupéAssociate Professor, Arizona State UniversityVerified email at asu.edu
Sailik SenguptaAmazon ScienceVerified email at amazon.com
Khaled Al-naamiPh.D. Computer Science, The University of Texas at Dallas
Heqing HuangAffiliate Professor @ UCAS, Bytedance US AI Lab/GenAI Security, TensorSec, IBM Watson, PANW, FireEye