Get my own profile
Public access
View all51 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Adam DoupéAssociate Professor, Arizona State UniversityVerified email at asu.edu
Hongxin HuProfessor of Computer Science, University at Buffalo, SUNYVerified email at buffalo.edu
Jing ChenProfessor, Wuhan UniversityVerified email at whu.edu.cn
Yan ShoshitaishviliArizona State UniversityVerified email at asu.edu
Kun HeWuhan UniversityVerified email at whu.edu.cn
Carlos E. Rubio-MedranoTexas A&M University - Corpus ChristiVerified email at tamucc.edu
Yiming JingBaidu USAVerified email at asu.edu
Huahong TuUniversity of MarylandVerified email at umd.edu
Jesús Martínez del RincónProfessor at Queen's University BelfastVerified email at qub.ac.uk
Long ChengAssociate Professor, School of Computing, Clemson UniversityVerified email at clemson.edu
Xi Tan (谭曦)University of Colorado Colorado SpringsVerified email at uccs.edu
Tiffany BaoArizona State UniversityVerified email at asu.edu
Haehyun ChoSoongsil UniversityVerified email at ssu.ac.kr
Erik TrickelSecurity Researcher, Arizona State UniversityVerified email at trickel.com
Kevin LiaoHarvard Law School, Massachusetts Institute of TechnologyVerified email at mit.edu
Penghui ZhangPh.D., MetaVerified email at asu.edu
Subbarao KambhampatiArizona State UniversityVerified email at asu.edu
Zheyuan MaPh.D. Student, University at BuffaloVerified email at buffalo.edu
Zhibo SunDrexel UniversityVerified email at drexel.edu