Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Zhuo LuUniversity of South FloridaEmail verificata su ieee.org
- Wenye WangNorth Carolina State UniversityEmail verificata su ncsu.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationEmail verificata su gmu.edu
- Peng NingGoogleEmail verificata su google.com
- Wesley SnyderProfessor of Electrical and Computer Engineering, NCSUEmail verificata su ncsu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Kun SunGeorge Mason UniversityEmail verificata su gmu.edu
- An LiuGoogleEmail verificata su google.com
- X. Sean WangSchool of Computer Science, Fudan UniversityEmail verificata su fudan.edu.cn
- Wes HardakerSenior Computer Scientist, USC/ISIEmail verificata su isi.edu
- Dawn SongProfessor of Computer Science, UC BerkeleyEmail verificata su cs.berkeley.edu
- Somesh JhaLubar Chair of Computer Science, University of WisconsinEmail verificata su cs.wisc.edu
- Wenliang DuSyracuse UniversityEmail verificata su ecs.syr.edu
- Radha PoovendranProfessor of Electrical and Computer Engineering, University of Washington, SeattleEmail verificata su uw.edu
- Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechEmail verificata su cc.gatech.edu
- Chenxi Wang (王晨曦)The University of TokyoEmail verificata su su.t.u-tokyo.ac.jp