Get my own profile
Public access
View all22 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Daniel TakabiProfessor and Director of School of Cybersecurity, Old Dominion UniversityVerified email at odu.edu
Saman Taghavi Zargar (Sam Zargar)Software Development Manager@Amazon BedrockVerified email at amazon.com
David TipperSchool of Computing and Information, University of PittsburghVerified email at tele.pitt.edu
Lei JinTsinghua University; School of Information Sciences, University of PittsburghVerified email at pitt.edu
Runhua XuBeihang University | former RSM@IBM ResearchVerified email at pitt.edu
Amir MasoumzadehUniversity at Albany - SUNYVerified email at albany.edu
Basit ShafiqLahore University of Management Sciences (LUMS)Verified email at lums.edu.pk
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Nathalie BaracaldoIBM Almaden Research Center, Senior Research Staff Member, Ph.D.Verified email at pitt.edu
Eugene H. SpaffordProfessor, Purdue UniversityVerified email at purdue.edu
Mohd AnwarProfessor of Computer Science, North Carolina A&T State UniversityVerified email at ncat.edu
Walid G. ArefPurdue UniversityVerified email at purdue.edu
Chao LiBeijing Jiaotong University | University of PittsburghVerified email at pitt.edu
Balaji PalanisamyAssociate Professor, School of Computing and Information, University of PittsburghVerified email at pitt.edu
Leila KarimiResearch ScientistVerified email at datometry.com
Youna JungAssociate Teaching Professor of Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Prashant KrishnamurthyProfessor, University of PittsburghVerified email at pitt.edu
Carlos CaicedoSyracuse UniversityVerified email at syr.edu
Summit TuladharUniversity of PittsburghVerified email at averesystems.com
Follow
James Joshi
Professor, SCI, University of Pittsburgh; Expert NSF-TIP
Verified email at pitt.edu - Homepage