Get my own profile
Public access
View all46 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Jaideep VaidyaDistinguished Professor, Rutgers UniversityVerified email at business.rutgers.edu
Haibing LuSanta Clara UniversityVerified email at scu.edu
Shangyu XieIllinois Institute of TechnologyVerified email at amazon.com
Lingyu WangProfessor, Concordia UniversityVerified email at ciise.concordia.ca
Han WangThe University of KansasVerified email at ku.edu
Hanbin HongUniversity of ConnecticutVerified email at uconn.edu
Meisam MohammadyAssistant Professor at Iowa State UniversityVerified email at iastate.edu
Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
Vijayalakshmi AtluriDistinguished Professor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
Xuegang BanUniversity of Washington, SeattleVerified email at uw.edu
Rachida DssouliConcordia UniversityVerified email at concordia.ca
Xinyu ZhangZhejiang UniversityVerified email at zju.edu.cn
Weiran LiuStaff Security Engineer, Alibaba GroupVerified email at alibaba-inc.com
Shuya FengPhd in UConnVerified email at uconn.edu
Xiaochen LiZhejiang UniversityVerified email at zju.edu.cn
Kai ShuAssistant Professor of Computer Science, Emory UniversityVerified email at emory.edu
Li XiongSamuel Dobbs Professor, Computer Science, Biomedical Informatics, Emory UniversityVerified email at emory.edu
Panagiotis KarrasProfessor, University of CopenhagenVerified email at di.ku.dk
Shenao YanUniversity of ConnecticutVerified email at uconn.edu
Yan YanUniversity of Illinois ChicagoVerified email at uic.edu