Get my own profile
Public access
View all55 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Yan ShoshitaishviliArizona State UniversityVerified email at asu.edu
Ziming Zhao (赵子铭)Associate Professor, Northeastern UniversityVerified email at northeastern.edu
Tiffany BaoArizona State UniversityVerified email at asu.edu
Ruoyu "Fish" WangArizona State UniversityVerified email at asu.edu
Giovanni VignaUC Santa Barbara and VMwareVerified email at cs.ucsb.edu
Adam OestAmazonVerified email at asu.edu
Christopher KruegelUniversity of California, Santa Barbara and Cisco, Inc.Verified email at cs.ucsb.edu
Haehyun ChoSoongsil UniversityVerified email at ssu.ac.kr
Penghui ZhangPh.D., MetaVerified email at asu.edu
Yeganeh SafaeiSEFCOM Lab, School of CIDSE, Arizona State UniversityVerified email at asu.edu
Erik TrickelSecurity Researcher, Arizona State UniversityVerified email at trickel.com
Zhibo SunDrexel UniversityVerified email at drexel.edu
Carlos E. Rubio-MedranoTexas A&M University - Corpus ChristiVerified email at tamucc.edu
Huahong TuUniversity of MarylandVerified email at umd.edu
Marthony TaguinodSEFCOM Lab, School of CIDSE, Arizona State UniversityVerified email at asu.edu
Yihui (Kyle) ZengArizona State UniversityVerified email at asu.edu
Faris Bugra KokuluPh.D. Student in Computer Science, Arizona State UniversityVerified email at asu.edu
Subbarao KambhampatiArizona State UniversityVerified email at asu.edu
Sukwha KyungArizona State UniversityVerified email at asu.edu