Crea il mio profilo
Accesso pubblico
Visualizza tutto42 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jaideep VaidyaDistinguished Professor, Rutgers UniversityEmail verificata su business.rutgers.edu
- Haibing LuSanta Clara UniversityEmail verificata su scu.edu
- Shangyu XieIllinois Institute of TechnologyEmail verificata su hawk.iit.edu
- Lingyu WangProfessor, NSERC/Ericsson Industrial Research Chair (IRC) in SDN/NFV Security, Concordia UniversityEmail verificata su ciise.concordia.ca
- Han WangUniversity of KansasEmail verificata su ku.edu
- Meisam MohammadyAssistant Professor at Iowa State UniversityEmail verificata su iastate.edu
- Vijayalakshmi AtluriProfessor of Information Systems, Rutgers UniverstiyEmail verificata su rutgers.edu
- Hanbin HongUniversity of ConnecticutEmail verificata su uconn.edu
- Rachida DssouliConcordia UniversityEmail verificata su concordia.ca
- Xuegang BanUniversity of Washington, SeattleEmail verificata su uw.edu
- Zhongjie BaZhejiang UniversityEmail verificata su zju.edu.cn
- Binghui WangAssistant Professor, Illinois Institute of TechnologyEmail verificata su iit.edu
- Anirban BasuHonorary Research Fellow (University of Sussex); Adjunct Professor (OntarioTech University); HitachiEmail verificata su sussex.ac.uk
- Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyEmail verificata su iit.edu
- Panagiotis KarrasProfessor, University of CopenhagenEmail verificata su di.ku.dk
- Li XiongSamuel Dobbs Professor, Computer Science, Biomedical Informatics, Emory UniversityEmail verificata su emory.edu
- Xiaochen LiZhejiang UniversityEmail verificata su zju.edu.cn
- Weiran LiuStaff Security Engineer, Alibaba GroupEmail verificata su alibaba-inc.com
- Xinyu ZhangZhejiang UniversityEmail verificata su zju.edu.cn
- Yan YanIllinois Institute of TechnologyEmail verificata su iit.edu