Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
Rocky SlavinAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Xiaoyin WangProfessor, University of Texas at San AntonioVerified email at utsa.edu
Joanne M. AtleeComputer Science, University of WaterlooVerified email at uwaterloo.ca
Nancy A. DayUniversity of WaterlooVerified email at uwaterloo.ca
Jaspreet BhatiaStaff Privacy Engineer, GoogleVerified email at cs.cmu.edu
Anupam JoshiOros Family Professor in Technology, CSEE Department, UMBCVerified email at umbc.edu
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Tim FininUniversity of Maryland, Baltimore CountyVerified email at umbc.edu
Lalana KagalMassachusetts Institute of TechnologyVerified email at csail.mit.edu
Omar Haider ChowdhuryAssociate Professor of CS at Stony Brook UniversityVerified email at cs.stonybrook.edu
Jeffery von RonneAssociate Professor of Computer Science, The University of Texas at San AntonioVerified email at utsa.edu
Jonathan ShahenGraduate Student in Computer Engineering, Waterloo UniversityVerified email at uwaterloo.ca
Mahesh TripunitaraProfessor, University of WaterlooVerified email at uwaterloo.ca
Anupam DattaSnowflake AI Research, Ex-Professor CMUVerified email at snowflake.com
Yier JinAssociate Professor, University of FloridaVerified email at ece.ufl.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Keith IrwinProfessor of Computer Science, Winston-Salem State UniversityVerified email at wssu.edu
Ting YuMohamed bin Zayed University of Artificial IntelligenceVerified email at acm.org