Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
kangkook JeeAssistant professor, University of Texas at DallasVerified email at utdallas.edu
Junghwan "John" RheeAssociate Professor, University of Central OklahomaVerified email at uco.edu
Xusheng XiaoAssociate Professor, Arizona State UniversityVerified email at asu.edu
Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
Steven GianvecchioMITREVerified email at mitre.org
Kangjie LuAssociate Professor, University of MinnesotaVerified email at umn.edu
Jianjun HuangSchool of Information, Renmin University of ChinaVerified email at ruc.edu.cn
Vasileios P. KemerlisAssociate Professor, Brown UniversityVerified email at cs.brown.edu
Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Bo ZongSalesforce.comVerified email at salesforce.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu