Get my own profile
Public access
View all28 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Divyakant AgrawalDistinguished Professor of Computer Science, UCSBVerified email at ucsb.edu
V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
hari sundaramUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Luigi Di CaroAssistant ProfessorVerified email at di.unito.it
Huan LiuProfessor of Computer Science and Engineering, Arizona State UniversityVerified email at asu.edu
yu-ru linUniversity of PittsburghVerified email at pitt.edu
Sibel AdaliProfessor of Computer Science, Associate Dean of Science for Research, Rensselaer PolytechnicVerified email at cs.rpi.edu
Huiping CaoAssociate Professor of Computer Science, New mexico State UniversityVerified email at cs.nmsu.edu
Qiong LuoHKUSTVerified email at cse.ust.hk
Lexing XieAustralian National UniversityVerified email at anu.edu.au
Yannis PapakonstantinouUCSDVerified email at eng.ucsd.edu
Keith KintighArizona State UniversityVerified email at asu.edu
Munmun De ChoudhuryGeorgia Institute of TechnologyVerified email at gatech.edu
Qing LiProfessor, Southwestern University of finance and EconomicsVerified email at swufe.edu.cn
Murat KantarciogluProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu
Dmitri V. KalashnikovSenior Applied Scientist at Amazon - Alexa AIVerified email at ics.uci.edu
Sethuraman PanchanathanProfessor of Computer Science and Engineering, Arizona State UniversityVerified email at asu.edu
Rida A. BazziArizona State UniversityVerified email at asu.edu
Elke RundensteinerProfessor of Computer Science, Worcester Polytechnic InstituteVerified email at wpi.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
K. Selcuk Candan
Professor of Computer Science and Engineering, Arizona State University
Verified email at asu.edu - Homepage