Get my own profile
Public access
View all10 articles
30 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Claudio BettiniUniversità degli Studi di MilanoVerified email at unimi.it
Peng NingGoogleVerified email at google.com
Sergio MascettiUniversità degli Studi di MilanoVerified email at unimi.it
Like GaoTigerGraph IncVerified email at tigergraph.com
Alexander BrodskyProfessor, Department of Computer Science, George Mason UniversityVerified email at gmu.edu
Dario FreniGoogleVerified email at google.com
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Weili HanFudan UniversityVerified email at fudan.edu.cn
Byung Suk LeeProfessor of Computer Science, University of VermontVerified email at uvm.edu
Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Yuan ZhangProfessor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
cliff wangNCSUVerified email at ncsu.edu
Min WangGoogle ResearchVerified email at google.com
Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
Yan Huang (黄艳)Regents Professor, Computer Science and Engineering, University of North TexasVerified email at unt.edu
Zhen HeAssociate Professor, La Trobe UniversityVerified email at latrobe.edu.au
Lei ChenHong Kong University of Science and TechnologyVerified email at cse.ust.hk
V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
Follow