Get my own profile
Public access
View all8 articles
27 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Claudio BettiniUniversity of MilanVerified email at unimi.it
Peng NingGoogleVerified email at google.com
Sergio MascettiUniversità degli Studi di MilanoVerified email at unimi.it
Alexander BrodskyProfessor, Department of Computer Science, George Mason UniversityVerified email at gmu.edu
Like GaoTigerGraph IncVerified email at tigergraph.com
Dario FreniGoogleVerified email at google.com
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Weili HanFudan UniversityVerified email at fudan.edu.cn
Byung Suk LeeProfessor of Computer Science, University of VermontVerified email at uvm.edu
Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Yuan ZhangAssociate Professor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
cliff wangNCSUVerified email at ncsu.edu
Min WangGoogle ResearchVerified email at google.com
Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
Zhen HeAssociate Professor, La Trobe UniversityVerified email at latrobe.edu.au
Yan Huang (黄艳)Regents Professor, Computer Science and Engineering, University of North TexasVerified email at unt.edu
Lei ChenHong Kong University of Science and TechnologyVerified email at cse.ust.hk
V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
Follow