Get my own profile
Public access
View all4 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Claudio BettiniUniversity of MilanVerified email at unimi.it
Peng NingGoogleVerified email at google.com
Sergio MascettiUniversitą degli Studi di MilanoVerified email at unimi.it
Like GaoTigerGraph IncVerified email at tigergraph.com
Alexander BrodskyProfessor, Department of Computer Science, George Mason UniversityVerified email at gmu.edu
Dario FreniGoogleVerified email at google.com
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
cliff wangNCSUVerified email at ncsu.edu
Min WangGoogle ResearchVerified email at google.com
Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
Byung Suk LeeProfessor of Computer Science, University of VermontVerified email at uvm.edu
Yan Huang (黄艳)Regents Professor, Computer Science and Engineering, University of North TexasVerified email at unt.edu
Zhen HeAssociate Professor, La Trobe UniversityVerified email at latrobe.edu.au
Lei ChenHong Kong University of Science and TechnologyVerified email at cse.ust.hk
Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Yuan ZhangAssociate Professor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
Ruoming JinProfessor of Computer Science, Kent State UniversityVerified email at cs.kent.edu
Follow