Get my own profile
Public access
View all32 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Jaideep VaidyaProfessor of Computer Information Systems, Rutgers UniversityVerified email at business.rutgers.edu
Haibing LuSanta Clara UniversityVerified email at scu.edu
Lingyu WangProfessor, NSERC/Ericsson Industrial Research Chair (IRC) in SDN/NFV Security, Concordia UniversityVerified email at ciise.concordia.ca
Shangyu XieIllinois Institute of TechnologyVerified email at hawk.iit.edu
Vijayalakshmi AtluriProfessor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
Rachida DssouliConcordia UniversityVerified email at concordia.ca
Meisam MohammadyResearch Scientist at CSIRO Data 61Verified email at data61.csiro.au
Anirban BasuHitachi R&D; Honorary Research Fellow (University of Sussex)Verified email at sussex.ac.uk
Ersin DincelliAssistant Professor of Information Systems, University of Colorado DenverVerified email at ucdenver.edu
PENGJUN WANIllinois Institute of TechnologyVerified email at cs.iit.edu
Xuegang BanUniversity of Washington, SeattleVerified email at uw.edu
Rujia WangIllinois Institute of TechnologyVerified email at iit.edu
Hanbin HongIllinois Institute of TechnologyVerified email at hawk.iit.edu
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterVerified email at us.ibm.com
Yan YanIllinois Institute of TechnologyVerified email at iit.edu
Valérie IssarnyDirectrice de recherche Inria