Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
Lei XuComputer Science Department, Kent State UniversityVerified email at kent.edu
Kalikinkar MandalAssistant Professor at University of New Brunswick, FrederictonVerified email at uwaterloo.ca
Weidong ShiUniversity of HoustonVerified email at uh.edu
Lin ChenDepartment of computer science, Zhejiang UniversityVerified email at zju.edu.cn
Daniel EngelsVerified email at alum.mit.edu
Zhimin GaoAuburn University at MontgomeryVerified email at aum.edu
Bo ZhuUniversity of WaterlooVerified email at uwaterloo.ca
Boyang WangUniversity of CincinnatiVerified email at uc.edu
Francesco SicaFlorida Atlantic UniversityVerified email at fau.edu
David JaoUniversity of WaterlooVerified email at uwaterloo.ca
Qingji ZhengVerified email at my.utsa.edu
Lei YangAmazonVerified email at amazon.com
Raullen ChaiUniversity of WaterlooVerified email at engmail.uwaterloo.ca
Gangqiang YangUniversity of WaterlooVerified email at uwaterloo.ca
Teng WuECE, university of waterlooVerified email at uwaterloo.ca
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Berry SchoenmakersAssociate Professor, TU EindhovenVerified email at tue.nl
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de