Get my own profile
Public access
View all6 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Vipin KumarUniversity of MinnesotaVerified email at umn.edu
- Pang-Ning TanProfessor of Computer Science, Michigan State UniversityVerified email at msu.edu
- Bamshad MobasherSchool of Computing, DePaul UniversityVerified email at cs.depaul.edu
- Ee-Peng LimSingapore Management UniversityVerified email at smu.edu.sg
- Prasanna DesikanData Science Leader, BlueshieldVerified email at blueshieldca.com
- Muhammad Aurangzeb AhmadAffiliate Assistant Professor, University of WashingtonVerified email at uw.edu
- Wonjun LeeIEEE Fellow, Professor, School of Cybersecurity, Korea University, SeoulVerified email at korea.ac.kr
- Noshir ContractorJane S. & William J. White Professor of Behavioral Sciences, Northwestern UniversityVerified email at northwestern.edu
- Nishith PathakWargaming.netVerified email at wargaming.net
- San-Yih HwangNational Sun Yet-sen UniversityVerified email at mis.nsysu.edu.tw
- Dmitri WilliamsProfessor, Annenberg School for Communication, University of Southern CaliforniaVerified email at usc.edu
- Levent ErtozVerified email at leventertoz.com
- Sandeep ManeHead of Data Science, Zeni IncVerified email at zeni.ai
- Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
- Zoheb BorboraDept. of Computer Science, University of MinnesotaVerified email at umn.edu
- Shashi ShekharMcKnight Distinguished University Professor of Computer Science, University of MinnesotaVerified email at umn.edu
- K. J. ShimSingapore Management UniversityVerified email at smu.edu.sg
- Ayush SinghalContata SolutionsVerified email at contata.com
- Brian KeeganUniversity of Colorado BoulderVerified email at colorado.edu
- Bhavtosh RathTarget, University of MinnesotaVerified email at umn.edu