Get my own profile
Public access
View all12 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Douglas ReevesProfessor of Computer Science, N.C. State UniversityVerified email at ncsu.edu
Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityVerified email at ncsu.edu
Yao LiuProfessor of Computer Science, University of South FloridaVerified email at cse.usf.edu
An LiuGoogleVerified email at google.com
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Ahmed M. AzabFacebookVerified email at fb.com
Wenbo ShenZhejiang UniversityVerified email at zju.edu.cn
Kun SunGeorge Mason UniversityVerified email at gmu.edu
cliff wangNCSUVerified email at ncsu.edu
Ruowen WangGoogle, Samsung Research America, North Carolina State UniversityVerified email at google.com
Attila A YavuzAssociate Professor, University of South FloridaVerified email at usf.edu
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
Yuan ZhangProfessor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Wu ZhouMetaVerified email at meta.com
Jia MaGoogle IncVerified email at google.com
William EnckProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Rudra DuttaProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu