Get my own profile
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Douglas ReevesProfessor of Computer Science, N.C. State UniversityVerified email at ncsu.edu
Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityVerified email at ncsu.edu
Wenliang DuSyracuse UniversityVerified email at ecs.syr.edu
Yao LiuAssociate Professor of Computer Science, University of South FloridaVerified email at cse.usf.edu
An LiuSamsung Research AmericaVerified email at samsung.com
Ahmed M. AzabGoogleVerified email at google.com
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Wenbo ShenZhejiang UniversityVerified email at zju.edu.cn
Kun SunGeorge Mason UniversityVerified email at gmu.edu
cliff wangARO/NCSUVerified email at ncsu.edu
Sencun ZhuPennsylvania State UniversityVerified email at cse.psu.edu
Attila A YavuzAssistant Professor, University of South FloridaVerified email at usf.edu
Wu ZhouDidi LabsVerified email at didichuxing.com
Yuan ZhangAssociate Professor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Ruowen WangGoogle, Samsung Research America, North Carolina State UniversityVerified email at google.com
Sanjeev SetiaDepartment of Computer Science, George Mason UniversityVerified email at gmu.edu
William EnckAssociate Professor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
Peng Ning
Verified email at google.com - Homepage