Get my own profile
Public access
View all13 articles
14 articles
available
not available
Based on funding mandates
Co-authors
Yan Lindsay SunUniversity of Rhode IslandVerified email at uri.edu
Behnam DezfouliAssociate Professor, Computer Science & Engineering, Santa Clara University, USAVerified email at scu.edu
haipeng pengBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateVerified email at psu.edu
Bhagyashri TushirPhD Student @ SIOT Lab, Santa Clara University, USAVerified email at scu.edu
He (Helen) HuangNorth Carolina State University & University of North Carolina at Chapel HillVerified email at ncsu.edu
Lixiang Li(李丽香)Professor in School of Cyberspace Security, Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Jun JiangPh.D. Candidate, Santa Clara UniversityVerified email at scu.edu
Syed S RizviPennsylvania State UniversityVerified email at psu.edu
Xiaorong ZhangSan Francisco State UniversityVerified email at sfsu.edu
Jin RenUniversity of Rhode IslandVerified email at ele.uri.edu
Na LiAssociate Professor, Prairie View A&M UniversityVerified email at pvamu.edu
Wenqi ZhouAssociate Professor of Information Systems Management, Duquesne UniversityVerified email at duq.edu
Xiaojun RuanAssociate Professor of Computer Science, California State University, East BayVerified email at csueastbay.edu
Yafei YangQualcomm Inc.Verified email at ele.uri.edu
Siyuan LiuLecturer, NTU, SingaporeVerified email at ntu.edu.sg
Xingliang YuanSchool of Computing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
Ting YuQatar Computing Research Institute (QCRI)Verified email at ncsu.edu