Get my own profile
Public access
View all84 articles
34 articles
available
not available
Based on funding mandates
Co-authors
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Mohammad M. MasudProfessor, College of Information Technology, United Arab Emirates UniversityVerified email at uaeu.ac.ae
Kevin W. HamlenLouis A. Beecherl, Jr. Distinguished Professor of Computer Science, The University of Texas atVerified email at utdallas.edu
Jiawei HanAbel Bliss Professor of Computer Science, University of IllinoisVerified email at cs.uiuc.edu
Murat KantarciogluProfessor of Computer Science, Virginia TechVerified email at vt.edu
Swarup ChandraHewlett Packard EnterpriseVerified email at hpe.com
Jing GaoAssociate Professor, Elmore Family School of Electrical and Computer Engineering, Purdue UniversityVerified email at purdue.edu
Mamoun AwadProfessor of Computer Science, UAE UniversityVerified email at uaeu.ac.ae
Zhuoyi WangApplied Scientist, AmazonVerified email at utdallas.edu
Patrick BrandtProfessor of Political Science, Public Policy, and Political Economy, University of Texas, DallasVerified email at utdallas.edu
Charu AggarwalDistinguished Research Staff Member, IBM T. J. Watson Research CenterVerified email at us.ibm.com
Ehab Al-ShaerCarnegie Mellon UniversityVerified email at cmu.edu
gbadebo ayoadeResearch Assistant University of Texas DallasVerified email at utdallas.edu
Satyen AbrolUniversity of Texas at DallasVerified email at rakuten.com
Ahsanul HaqueData Scientist, MicrosoftVerified email at microsoft.com
Zhiqiang LinDistinguished Professor of Engineering, The Ohio State UniversityVerified email at cse.ohio-state.edu
Mohiuddin SolaimaniSr. Application Architect, HCSCVerified email at bcbstx.com
Feng LuoProfessor, School of Computing, Clemson UniversityVerified email at clemson.edu
Prabhakaran BalakrishnanUniversity of Texas at DallasVerified email at utdallas.edu
Vishal KarandeSoftware Engineer at GoogleVerified email at google.com