Get my own profile
Public access
View all37 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Adam DoupéAssociate Professor, Arizona State UniversityVerified email at asu.edu
Hongxin HuAssociate Professor of Computer Science, University at Buffalo, SUNYVerified email at buffalo.edu
Carlos E. Rubio-MedranoTexas A&M University - Corpus ChristiVerified email at tamucc.edu
Yan ShoshitaishviliArizona State UniversityVerified email at asu.edu
Yiming JingBaidu USAVerified email at asu.edu
Jing ChenProfessor, Wuhan UniversityVerified email at whu.edu.cn
Huahong TuUniversity of MarylandVerified email at umd.edu
Jesús Martínez del RincónSenior Lecturer at Queen's University BelfastVerified email at qub.ac.uk
Haehyun ChoSoongsil UniversityVerified email at ssu.ac.kr
Erik TrickelSecurity Researcher, Arizona State UniversityVerified email at trickel.com
Subbarao KambhampatiArizona State UniversityVerified email at asu.edu
Kevin LiaoMassachusetts Institute of Technology (MIT)Verified email at mit.edu
Tiffany BaoArizona State UniversityVerified email at asu.edu
Josephine LampPhD Candidate, University of VirginiaVerified email at virginia.edu
Penghui ZhangPh.D., MetaVerified email at asu.edu
Kun HeWuhan UniversityVerified email at whu.edu.cn
Zhibo SunDrexel UniversityVerified email at drexel.edu
Cong WuResearch Fellow, Nanyang Technological UniversityVerified email at ntu.edu.sg
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn