Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Haining WangProfessor of ECE, Virginia TechVerified email at vt.edu
- kangkook JeeAssistant professor, University of Texas at DallasVerified email at utdallas.edu
- Junghwan "John" RheeAssociate Professor, University of Central OklahomaVerified email at uco.edu
- Xusheng XiaoAssociate Professor, Arizona State UniversityVerified email at asu.edu
- Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
- Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
- Steven GianvecchioMITREVerified email at mitre.org
- Kangjie LuAssociate Professor, University of MinnesotaVerified email at umn.edu
- Jianjun HuangSchool of Information, Renmin University of ChinaVerified email at ruc.edu.cn
- Vasileios P. KemerlisAssociate Professor, Brown UniversityVerified email at cs.brown.edu
- Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
- Bo ZongSalesforce.comVerified email at salesforce.com
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu