Get my own profile
Public access
View all69 articles
8 articles
available
not available
Based on funding mandates
Co-authors
- Ing-Ray ChenVirginia TechVerified email at vt.edu
- Feng ChenDepartment of Computer Science, UT DallasVerified email at utdallas.edu
- Sibel AdaliProfessor of Computer Science, Associate Dean of Science for Research, Rensselaer PolytechnicVerified email at cs.rpi.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
- John O'DonovanTeladoc Health Inc. and Computer Science Dept., University of California, Santa BarbaraVerified email at cs.ucsb.edu
- Richard Garcia-LebronUniversity of Texas at San AntonioVerified email at utsa.edu
- Chang-Tien Lu, IEEE FellowComputer Science, Virginia TechVerified email at vt.edu
- Alessandro OltramariBosch Research and Technology CenterVerified email at us.bosch.com
- Ding-Chau WangDepartment of Information Management, Southern Taiwan University of Science and TechnologyVerified email at stust.edu.tw
- Tarek AbdelzaherUniversity of IllinoisVerified email at illinois.edu
- Hasan CamBest BuyVerified email at bestbuy.com
- Prasant MohapatraProfessor of Computer Science and Engineering, University of South FloridaVerified email at usf.edu
- Sujoy SikdarAssistant Professor, Binghamton UniversityVerified email at binghamton.edu
- Byungkyu (Jay) KangIntuit AIVerified email at intuit.com
- Gulustan DoganUniversity of North Carolina WilmingtonVerified email at uncw.edu
- Ted Brownprofessor computer science, queensVerified email at gc.cuny.edu
- Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
- Xin ChenThe Pennsylvania State UniversityVerified email at psu.edu
- Jennifer MangelsBaruch College, CUNYVerified email at baruch.cuny.edu