Get my own profile
Public access
View all33 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Kang G. ShinKevin & Nancy O'Connor Professor of Computer Science, University of MichiganVerified email at umich.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Steven GianvecchioMITREVerified email at mitre.org
Zhenyu WuNEC Laboratories America Inc.Verified email at nec-labs.com
Angelos StavrouProfessor at Virginia TechVerified email at vt.edu
Chuan YueAssociate Professor of Computer Science, Colorado School of MinesVerified email at mines.edu
Zhang XuCollege of william and maryVerified email at email.wm.edu
Zi ChuAirbnb, Twitter, The College of William & MaryVerified email at airbnb.com
Xing GaoAssistant Professor, University of DelawareVerified email at udel.edu
Kun SunGeorge Mason UniversityVerified email at gmu.edu
hai huangIBM ResearchVerified email at us.ibm.com
Daiping LiuPalo Alto NetworksVerified email at udel.edu
Xiaodong ZhangThe Ohio State UniversityVerified email at cse.ohio-state.edu
Qun LiIEEE Fellow, Professor of Computer Science, College of William & MaryVerified email at cs.wm.edu
Aaron KoehlClinical Associate Professor, Mason School of Business, College of William and MaryVerified email at wm.edu
Haitao XuZhejiang UniversityVerified email at zju.edu.cn
Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Dachuan LiuPh.D. of Computer Science, College of William and MaryVerified email at cs.wm.edu
Heng YinProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
Songqing ChenGeorge Mason UniversityVerified email at cs.gmu.edu