Get my own profile
Public access
View all14 articles
11 articles
available
not available
Based on funding mandates
Co-authors
- Yan Lindsay SunUniversity of Rhode IslandVerified email at uri.edu
- Behnam DezfouliAssociate Professor, Computer Science & Engineering, Santa Clara University, USAVerified email at scu.edu
- haipeng pengBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
- Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateVerified email at psu.edu
- Bhagyashri TushirPhD Student @ SIOT Lab, Santa Clara University, USAVerified email at scu.edu
- He (Helen) HuangNorth Carolina State University & University of North Carolina at Chapel HillVerified email at ncsu.edu
- Lixiang Li(李丽香)Professor in School of Cyberspace Security, Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
- Jun JiangPh.D. Candidate, Santa Clara UniversityVerified email at scu.edu
- Syed S RizviPennsylvania State UniversityVerified email at psu.edu
- Xiaorong ZhangSan Francisco State UniversityVerified email at sfsu.edu
- Jin RenUniversity of Rhode IslandVerified email at ele.uri.edu
- Na LiAssociate Professor, Prairie View A&M UniversityVerified email at pvamu.edu
- Wenqi ZhouAssociate Professor of Information Systems Management, Duquesne UniversityVerified email at duq.edu
- Xiaojun RuanAssociate Professor of Computer Science, California State University, East BayVerified email at csueastbay.edu
- Yafei YangQualcomm Inc.Verified email at ele.uri.edu
- Siyuan LiuLecturer, NTU, SingaporeVerified email at ntu.edu.sg
- Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityVerified email at monash.edu
- Ting YuQatar Computing Research Institute (QCRI)Verified email at ncsu.edu