Get my own profile
Public access
View all51 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Gail-Joon AhnArizona State UniversityVerified email at asu.edu
- Ziming Zhao (赵子铭)Associate Professor, Northeastern UniversityVerified email at northeastern.edu
- Yan ShoshitaishviliArizona State UniversityVerified email at asu.edu
- Tiffany BaoArizona State UniversityVerified email at asu.edu
- Giovanni VignaUC Santa Barbara and VMwareVerified email at cs.ucsb.edu
- Ruoyu "Fish" WangArizona State UniversityVerified email at asu.edu
- Adam OestAmazonVerified email at asu.edu
- Christopher KruegelUniversity of California, Santa Barbara and Cisco, Inc.Verified email at cs.ucsb.edu
- Haehyun ChoSoongsil UniversityVerified email at ssu.ac.kr
- Penghui ZhangPh.D., MetaVerified email at asu.edu
- Yeganeh SafaeiSEFCOM Lab, School of CIDSE, Arizona State UniversityVerified email at asu.edu
- Erik TrickelSecurity Researcher, Arizona State UniversityVerified email at trickel.com
- Zhibo SunDrexel UniversityVerified email at drexel.edu
- Carlos E. Rubio-MedranoTexas A&M University - Corpus ChristiVerified email at tamucc.edu
- Huahong TuUniversity of MarylandVerified email at umd.edu
- Marthony TaguinodSEFCOM Lab, School of CIDSE, Arizona State UniversityVerified email at asu.edu
- Yihui (Kyle) ZengArizona State UniversityVerified email at asu.edu
- Faris Bugra KokuluPh.D. Student in Computer Science, Arizona State UniversityVerified email at asu.edu
- Subbarao KambhampatiArizona State UniversityVerified email at asu.edu
- Sukwha KyungArizona State UniversityVerified email at asu.edu