Get my own profile
Public access
View all16 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Wenye WangNorth Carolina State UniversityVerified email at ncsu.edu
- Zhuo LuUniversity of South FloridaVerified email at ieee.org
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Peng NingGoogleVerified email at google.com
- Wesley SnyderProfessor of Electrical and Computer Engineering, NCSUVerified email at ncsu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Kun SunGeorge Mason UniversityVerified email at gmu.edu
- X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- An LiuGoogleVerified email at google.com
- Wes HardakerSenior Computer Scientist, USC/ISIVerified email at isi.edu
- Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
- Wenliang DuSyracuse UniversityVerified email at ecs.syr.edu
- Radha PoovendranProfessor of ECE, University of WashingtonVerified email at uw.edu
- Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
- Chenxi Wang (王晨曦)The University of TokyoVerified email at su.t.u-tokyo.ac.jp