Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
23 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationEmail verificata su gmu.edu
- Claudio BettiniUniversity of MilanEmail verificata su unimi.it
- Peng NingGoogleEmail verificata su google.com
- Sergio MascettiUniversità degli Studi di MilanoEmail verificata su unimi.it
- Alexander BrodskyProfessor, Department of Computer Science, George Mason UniversityEmail verificata su gmu.edu
- Like GaoTigerGraph IncEmail verificata su tigergraph.com
- Dario FreniGoogleEmail verificata su google.com
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonEmail verificata su uoregon.edu
- Weili HanFudan UniversityEmail verificata su fudan.edu.cn
- Byung Suk LeeProfessor of Computer Science, University of VermontEmail verificata su uvm.edu
- Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityEmail verificata su fudan.edu.cn
- Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityEmail verificata su cse.tamu.edu
- Yuan ZhangProfessor, School of Computer Science, Fudan UniversityEmail verificata su fudan.edu.cn
- cliff wangNCSUEmail verificata su ncsu.edu
- Min WangGoogle ResearchEmail verificata su google.com
- Duminda WijesekeraGeorge mason UniversityEmail verificata su gmu.edu
- Zhen HeAssociate Professor, La Trobe UniversityEmail verificata su latrobe.edu.au
- Yan Huang (黄艳)Regents Professor, Computer Science and Engineering, University of North TexasEmail verificata su unt.edu
- Lei ChenHong Kong University of Science and TechnologyEmail verificata su cse.ust.hk
- V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeEmail verificata su dartmouth.edu
Segui
X. Sean Wang
School of Computer Science, Fudan University
Email verificata su fudan.edu.cn - Home page