Get my own profile
Public access
View all3 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Claudio BettiniUniversity of MilanVerified email at unimi.it
Peng NingGoogleVerified email at google.com
Sergio MascettiUniversitą degli Studi di MilanoVerified email at unimi.it
Like GaoTigerGraph IncVerified email at tigergraph.com
Alexander BrodskyProfessor, Department of Computer Science, George Mason UniversityVerified email at gmu.edu
Dario FreniGoogleVerified email at google.com
Yingjiu LiRipple Professor, Computer and Information Science Department, University of OregonVerified email at uoregon.edu
Min WangGoogle ResearchVerified email at google.com
Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
Byung Suk LeeProfessor of Computer Science, University of VermontVerified email at uvm.edu
cliff wangARO/NCSUVerified email at ncsu.edu
V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
Yan Huang (黄艳)University of North TexasVerified email at unt.edu
Zhen HeAssociate Professor, La Trobe UniversityVerified email at latrobe.edu.au
Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Yuan ZhangAssociate Professor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Curtis DyresonComputer Science, Utah State UniversityVerified email at usu.edu
Richard SnodgrassProfessor of Computer Science, University of ArizonaVerified email at cs.arizona.edu