Get my own profile
Public access
View all16 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Zhuo LuUniversity of South FloridaVerified email at usf.edu
Wenye WangNorth Carolina State UniversityVerified email at ncsu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Peng NingGoogleVerified email at google.com
Wesley SnyderProfessor of Electrical and Computer Engineering, NCSUVerified email at ncsu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Kun SunGeorge Mason UniversityVerified email at gmu.edu
An LiuGoogleVerified email at google.com
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Wes HardakerSenior Computer Scientist, USC/ISIVerified email at isi.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Wenliang DuSyracuse UniversityVerified email at ecs.syr.edu
Radha PoovendranProfessor of Electrical and Computer Engineering, University of Washington, SeattleVerified email at uw.edu
Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
Sumit RoyU WashingtonVerified email at ee.washington.edu
Chenxi Wang (王晨曦)The University of TokyoVerified email at su.t.u-tokyo.ac.jp