Get my own profile
Public access
View all45 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jaideep VaidyaDistinguished Professor, Rutgers UniversityVerified email at business.rutgers.edu
Haibing LuSanta Clara UniversityVerified email at scu.edu
Shangyu XieIllinois Institute of TechnologyVerified email at amazon.com
Lingyu WangProfessor, Concordia UniversityVerified email at ciise.concordia.ca
Han WangThe University of KansasVerified email at ku.edu
Hanbin HongUniversity of ConnecticutVerified email at uconn.edu
Meisam MohammadyAssistant Professor at Iowa State UniversityVerified email at iastate.edu
Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
Vijayalakshmi AtluriDistinguished Professor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
Rachida DssouliConcordia UniversityVerified email at concordia.ca
Xuegang BanUniversity of Washington, SeattleVerified email at uw.edu
Xinyu ZhangZhejiang UniversityVerified email at zju.edu.cn
Weiran LiuStaff Security Engineer, Alibaba GroupVerified email at alibaba-inc.com
Kai ShuAssistant Professor of Computer Science, Emory UniversityVerified email at emory.edu
Shuya FengPhd in UConnVerified email at uconn.edu
Li XiongSamuel Dobbs Professor, Computer Science, Biomedical Informatics, Emory UniversityVerified email at emory.edu
Xiaochen LiZhejiang UniversityVerified email at zju.edu.cn
Shenao YanUniversity of ConnecticutVerified email at uconn.edu
Panagiotis KarrasProfessor, University of CopenhagenVerified email at di.ku.dk
Yan YanUniversity of Illinois ChicagoVerified email at uic.edu