Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Kang ZhaoProfessor and Tippie Research Fellow, University of IowaEmail verificata su uiowa.edu
- C Lee GilesPennsylvania State UniversityEmail verificata su psu.edu
- Magy Seif El-NasrUniversity of California at Santa CruzEmail verificata su ucsc.edu
- Baojun QiueBay Inc./Pennsylvania State UniversityEmail verificata su ebay.com
- Dinghao WuPennsylvania State UniversityEmail verificata su psu.edu
- Hyun-Woo "Anthony" KimThe Pennsylvania State UniversityEmail verificata su ist.psu.edu
- Lotfi A. ZadehProfessor Emeritus, EECS, UC BerkeleyEmail verificata su eecs.berkeley.edu
- Bernard J. (Jim) JansenQatar Computing Research Institute, HBKUEmail verificata su acm.org
- Shenghuo Zhu (朱胜火)AibeeEmail verificata su aibee.com
- Linjun YangMicrosoftEmail verificata su microsoft.com
Segui