Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Charles KamhouaTeam Leader, Adversarial Resilient Cyber Methodology, DEVCOM Army Research LaboratoryVerified email at army.mil
Ahmed H. Anwar, (Ahmed Hemida)Research Scientist, DEVCOM ARLVerified email at knights.ucf.edu
Mu ZhuNorth Carolina State UniversityVerified email at ncsu.edu
Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Yash MahajanOracleVerified email at vt.edu
Beom Woo KangHanyang UniversityVerified email at hanyang.ac.kr
Xujiang ZhaoResearcher at NEC Laboratories AmericaVerified email at nec-labs.com
Zhen GuoPhD, CS@ Virginia TechVerified email at vt.edu
Feng ChenDepartment of Computer Science, UT DallasVerified email at utdallas.edu
Abdullah Zubair MohammedPh.D. student, Virginia TechVerified email at vt.edu