Crea il mio profilo
Accesso pubblico
Visualizza tutto45 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jaideep VaidyaDistinguished Professor, Rutgers UniversityEmail verificata su business.rutgers.edu
- Haibing LuSanta Clara UniversityEmail verificata su scu.edu
- Shangyu XieIllinois Institute of TechnologyEmail verificata su amazon.com
- Lingyu WangProfessor, Concordia UniversityEmail verificata su ciise.concordia.ca
- Han WangThe University of KansasEmail verificata su ku.edu
- Hanbin HongUniversity of ConnecticutEmail verificata su uconn.edu
- Meisam MohammadyAssistant Professor at Iowa State UniversityEmail verificata su iastate.edu
- Binghui WangAssistant Professor, Illinois Institute of TechnologyEmail verificata su iit.edu
- Vijayalakshmi AtluriDistinguished Professor of Information Systems, Rutgers UniverstiyEmail verificata su rutgers.edu
- Rachida DssouliConcordia UniversityEmail verificata su concordia.ca
- Xuegang BanUniversity of Washington, SeattleEmail verificata su uw.edu
- Xinyu ZhangZhejiang UniversityEmail verificata su zju.edu.cn
- Weiran LiuStaff Security Engineer, Alibaba GroupEmail verificata su alibaba-inc.com
- Kai ShuAssistant Professor of Computer Science, Emory UniversityEmail verificata su emory.edu
- Shuya FengPhd in UConnEmail verificata su uconn.edu
- Li XiongSamuel Dobbs Professor, Computer Science, Biomedical Informatics, Emory UniversityEmail verificata su emory.edu
- Xiaochen LiZhejiang UniversityEmail verificata su zju.edu.cn
- Shenao YanUniversity of ConnecticutEmail verificata su uconn.edu
- Panagiotis KarrasProfessor, University of CopenhagenEmail verificata su di.ku.dk
- Yan YanUniversity of Illinois ChicagoEmail verificata su uic.edu