Get my own profile
Public access
View all16 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Indrakshi RayProfessor of Computer Science, Colorado State UniversityVerified email at cs.colostate.edu
Alex X. LiuMichigan State UniversityVerified email at cse.msu.edu
Sandeep KulkarniMichigan State UniversityVerified email at msu.edu
Indrajit RayProfessor, Computer Science, Colorado State UniversityVerified email at colostate.edu
Kishore KothapalliIIIT HyderabadVerified email at iiit.ac.in
Hossein ShiraziAssistant Professor, Management Information Systems, San Diego State UniversityVerified email at sdsu.edu
Liyan WangVerified email at cse.msu.edu
Fei ChenMichigan State UniversityVerified email at cse.msu.edu
Vijay LaxmiProfessor (Computer Science and Engineering), Malaviya National Institute of Technology JaipurVerified email at mnit.ac.in
Prof. Dr Dugyala RamanChaitanya Bharathi Insititute of TechnologyVerified email at cbit.ac.in
Dr. Sandeep A. ThoratIT Department, Government College of Engineering KaradVerified email at gcoeara.ac.in
Charles Andersonprofessor of computer science, Colorado State University. Founder Pattern Exploration, LLC.Verified email at colostate.edu
Bargav JayaramanResearch Scientist at OracleVerified email at oracle.com
Meenakshi TripathiAssistant Professor, MNITVerified email at mnit.ac.in
Sheng XiaoHunan UniversityVerified email at hnu.edu.cn
Akka ZEMMARIProfessor of Computer Science, LaBRI - Univ. Bordeaux, FRANCEVerified email at labri.fr
Jyoti GajraniMNIT JaipurVerified email at mnit.ac.in
Krishna Chaitanya TelikicherlaPrincipal Security Engineer, MicrosoftVerified email at microsoft.com
Kushagra TiwaryGraduate Student, Colorado State UniversityVerified email at colostate.edu
Parvez Faruki, Ph.DSecurity & Privacy, Head of Department, Information Technology, Gujarat India, Ayelite S&P IndiaVerified email at mnit.ac.in