Get my own profile
Public access
View all68 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Yan ShoshitaishviliArizona State UniversityVerified email at asu.edu
Ziming Zhao (赵子铭)Associate Professor, Northeastern UniversityVerified email at northeastern.edu
Tiffany BaoArizona State UniversityVerified email at asu.edu
Ruoyu "Fish" WangArizona State UniversityVerified email at asu.eduGiovanni VignaUC Santa Barbara and VMwareVerified email at cs.ucsb.edu
Adam OestAmazonVerified email at asu.edu
Christopher KruegelUniversity of California, Santa Barbara and Cisco, Inc.Verified email at cs.ucsb.eduHaehyun ChoSoongsil UniversityVerified email at ssu.ac.kr
Penghui ZhangPh.D., MetaVerified email at asu.edu
Yeganeh SafaeiSEFCOM Lab, School of CIDSE, Arizona State UniversityVerified email at asu.eduErik TrickelSecurity Researcher, Arizona State UniversityVerified email at trickel.com
Zhibo SunDrexel UniversityVerified email at drexel.eduCarlos E. Rubio-MedranoTexas A&M University - Corpus ChristiVerified email at tamucc.edu
Yihui (Kyle) ZengArizona State UniversityVerified email at asu.edu
Zion Leonahenahe BasquePhD Candidate, Arizona State UniversityVerified email at asu.edu
Ananta SonejiPhD Student, Arizona State UniversityVerified email at asu.edu
Huahong TuUniversity of MarylandVerified email at umd.edu
Faris Bugra KokuluPh.D. Student in Computer Science, Arizona State UniversityVerified email at asu.edu
Marthony TaguinodSEFCOM Lab, School of CIDSE, Arizona State UniversityVerified email at asu.edu