Get my own profile
Co-authors
Zhuo LuUniversity of South FloridaVerified email at usf.edu
Wenye WangNorth Carolina State UniversityVerified email at ncsu.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Peng NingGoogleVerified email at google.com
Wesley SnyderProfessor of Electrical and Computer Engineering, NCSUVerified email at ncsu.edu
Kun SunGeorge Mason UniversityVerified email at gmu.edu
An LiuSamsung Research AmericaVerified email at samsung.com
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Wes HardakerSenior Computer Scientist, USC/ISIVerified email at isi.edu
Wenliang DuSyracuse UniversityVerified email at ecs.syr.edu
Radha PoovendranProfessor of Electrical and Computer Engineering, University of Washington, SeattleVerified email at uw.edu
Wenke LeeProfessor of Computer Science at Georgia TechVerified email at cc.gatech.edu
Sumit RoyU WashingtonVerified email at ee.washington.edu
Chenxi Wang (王晨曦)The University of TokyoVerified email at su.t.u-tokyo.ac.jp
