Get my own profile
Public access
View all33 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Adam DoupéAssociate Professor, Arizona State UniversityVerified email at asu.edu
Hongxin HuAssociate Professor of Computer Science, University at Buffalo, SUNYVerified email at buffalo.edu
Carlos E. Rubio-MedranoTexas A&M University - Corpus ChristiVerified email at tamucc.edu
Yan ShoshitaishviliArizona State UniversityVerified email at asu.edu
Yiming JingBaidu USAVerified email at asu.edu
Jing ChenProfessor, Wuhan UniversityVerified email at whu.edu.cn
Huahong TuUniversity of MarylandVerified email at umd.edu
Jesús Martínez del RincónSenior Lecturer at Queen's University BelfastVerified email at qub.ac.uk
Haehyun ChoSoongsil UniversityVerified email at ssu.ac.kr
Subbarao KambhampatiArizona State UniversityVerified email at asu.edu
Erik TrickelSecurity Researcher, Arizona State UniversityVerified email at trickel.com
Kevin LiaoMassachusetts Institute of Technology (MIT)Verified email at mit.edu
Josephine LampPhD Candidate, University of VirginiaVerified email at virginia.edu
Tiffany BaoArizona State UniversityVerified email at asu.edu
Penghui ZhangPh.D., MetaVerified email at asu.edu
Zhibo SunDrexel UniversityVerified email at drexel.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Kun HeWuhan UniversityVerified email at whu.edu.cn
Jinbum ParkSamsung ResearchVerified email at samsung.com