Get my own profile
Public access
View all17 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Scott A. DeLoachProfessor and Head, Department of Computer Science, Kansas State UniversityVerified email at ksu.edu
Su ZhangSecurity Architect at Pony.aiVerified email at pony.ai
Sathya Chandran SundaramurthyNetflixVerified email at netflix.com
Rui ZhuangDirector of Research, Wahaha Intelligent RoboticsVerified email at ksu.edu
Doina CarageaKansas State UniversityVerified email at ksu.edu
John HomerProfessor of Computer Science, Abilene Christian UniversityVerified email at acu.edu
Yuping LiUniversity of South FloridaVerified email at mail.usf.edu
Sankardas RoyAssistant Professor, BGSUVerified email at bgsu.edu
Fengguo WeiSenior Software Engineer, GoogleVerified email at google.com
Michael WeschAssociate Professor of Cultural Anthropology, Kansas State UniversityVerified email at ksu.edu
Andrew W. AppelProfessor of Computer Science, Princeton UniversityVerified email at princeton.edu
Loai ZomlotMicrosoftVerified email at ksu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Jiyong JangResearch Scientist, IBM ResearchVerified email at us.ibm.com
Weimin ZhengTsinghua UniversityVerified email at tsinghua.edu.cn
Wu ZhouDidi LabsVerified email at didichuxing.com
Xin HuIBM T.J. Watson Research Center at Yorktown Heights, NYVerified email at us.ibm.com
Gang TanProfessor of computer science and engineering, Penn State UniversityVerified email at cse.psu.edu
David WalkerPrinceton UniversityVerified email at cs.princeton.edu
Xinwen ZhangHiretualVerified email at hiretual.com
Follow
Xinming (Simon) Ou
Professor of Computer Science and Engineering, University of South Florida
Verified email at usf.edu - Homepage