Get my own profile
Public access
View all42 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jaideep VaidyaDistinguished Professor, Rutgers UniversityVerified email at business.rutgers.edu
Haibing LuSanta Clara UniversityVerified email at scu.edu
Shangyu XieIllinois Institute of TechnologyVerified email at hawk.iit.edu
Lingyu WangProfessor, NSERC/Ericsson Industrial Research Chair (IRC) in SDN/NFV Security, Concordia UniversityVerified email at ciise.concordia.ca
Han WangUniversity of KansasVerified email at ku.edu
Meisam MohammadyAssistant Professor at Iowa State UniversityVerified email at iastate.edu
Hanbin HongUniversity of ConnecticutVerified email at uconn.edu
Vijayalakshmi AtluriProfessor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
Rachida DssouliConcordia UniversityVerified email at concordia.ca
Xuegang BanUniversity of Washington, SeattleVerified email at uw.edu
Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
Zhongjie BaZhejiang UniversityVerified email at zju.edu.cn
Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyVerified email at iit.edu
Xiaochen LiZhejiang UniversityVerified email at zju.edu.cn
Li XiongSamuel Dobbs Professor, Computer Science, Biomedical Informatics, Emory UniversityVerified email at emory.edu
Xinyu ZhangZhejiang UniversityVerified email at zju.edu.cn
Weiran LiuStaff Security Engineer, Alibaba GroupVerified email at alibaba-inc.com
Panagiotis KarrasProfessor, University of CopenhagenVerified email at di.ku.dk
Shuya FengUniversity of ConnecticutVerified email at uconn.edu
Yan YanIllinois Institute of TechnologyVerified email at iit.edu