Get my own profile
Public access
View all14 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Reza CurtmolaProfessor of Computer Science, New Jersey Institute of Technology (NJIT)Verified email at njit.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Shijie JiaAssistant Professor of Institute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Bing ChangResearch Fellow, Singapore Management UniversityVerified email at smu.edu.sg
Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Giuseppe AtenieseStevens Institute of TechnologyVerified email at stevens.edu
Randal BurnsProfessor of Computer Science, Johns Hopkins UniversityVerified email at cs.jhu.edu
Huan LiuProfessor of Computer Science and Engineering, Arizona State UniversityVerified email at asu.edu
Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyVerified email at iit.edu
Jundong LiAssistant Professor, University of VirginiaVerified email at virginia.edu
Suhang WangPennsylvania State UniversityVerified email at psu.edu
Yingjiu LiRipple Professor, Computer and Information Science Department, University of OregonVerified email at uoregon.edu
Dipankar Dasgupta, IEEE FellowProfessor of Computer Science, The University of MemphisVerified email at memphis.edu
Chen ZhongThe University of TampaVerified email at ut.edu
John YenUniversity Professor of Information Sciences and Technology, The Pennsylvania State UniversityVerified email at ist.psu.edu
Anil Kumar AmmulaStudent of New Jersey Institute of TechnologyVerified email at njit.edu
Haitao XuArizona State UniversityVerified email at asu.edu
Le GuanDepartment of Computer Science at the University of GeorgiaVerified email at cs.uga.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
xinyu xingThe Pennsylvania State UniversityVerified email at ist.psu.edu