Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Apu KapadiaProfessor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
- Tousif AhmedPrivacy Engineer & Applied Privacy Researcher @ GoogleVerified email at google.com
- Bryan SemaanAssociate Professor, University of Colorado BoulderVerified email at colorado.edu
- Bryan DosonoPhD, Information Science and TechnologyVerified email at sigchi.org
- Imtiaz AhmadGrand Valley State UniversityVerified email at gvsu.edu
- Adam J. LeeProfessor of Computer Science, University of PittsburghVerified email at pitt.edu
- Yasmeen RashidiAsst. Prof. of Informatics, Umm Al-Qura Uni, PhD (Security Informatics-Indiana Uni)Verified email at uqu.edu.sa
- Ashikur RahmanProfessor, Department of Computer Science & Engg. (CSE), Bangladesh Univ. of Engg. & Tech. (BUETVerified email at cse.buet.ac.bd
- Mashrura TasnimUniversity of AlbertaVerified email at ualberta.ca
- Sabid Bin Habib PiasPh.D. Student, Department of Computer Science, Indiana UniversityVerified email at iu.edu
- Rosta FarzanUniversity of PittsburghVerified email at pitt.edu
- Anne Marie PiperUniversity of California IrvineVerified email at uci.edu
- Stacy BranhamAssociate Professor, UC IrvineVerified email at uci.edu
- Yoonha ChaUniversity of California, IrvineVerified email at uci.edu
- Isabela FigueiraPhD Student at UC IrvineVerified email at uci.edu
- Novia NurainPostdoctoral Researcher, University of MichiganVerified email at umich.edu
- A. B. M. Alim Al IslamProfessor, Department of CSE, Bangladesh University of Engineering and Technology (BUET)Verified email at cse.buet.ac.bd
- Timothy TrammelNIWC PacificVerified email at us.navy.mil
- Swami ManoharMicrosoft Research, LimberLink Technologies, Strand Lifesciences, Indian Institute of ScienceVerified email at microsoft.com
Follow
Taslima Akter
Assistant Professor, University of Texas San Antonio
Verified email at utsa.edu - Homepage