Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Apu KapadiaProfessor of Computer Science, Indiana UniversityEmail verificata su indiana.edu
- Tousif AhmedPrivacy Engineer & Applied Privacy Researcher @ GoogleEmail verificata su google.com
- Bryan SemaanAssociate Professor, University of Colorado BoulderEmail verificata su colorado.edu
- Bryan DosonoPhD, Information Science and TechnologyEmail verificata su syr.edu
- Yasmeen RashidiAsst. Prof. of Informatics, Umm Al-Qura Uni, PhD (Security Informatics-Indiana Uni)Email verificata su uqu.edu.sa
- Ashikur RahmanProfessor, Department of Computer Science & Engg. (CSE), Bangladesh Univ. of Engg. & Tech. (BUETEmail verificata su cse.buet.ac.bd
- Mashrura TasnimUniversity of AlbertaEmail verificata su ualberta.ca
- Imtiaz AhmadGrand Valley State UniversityEmail verificata su gvsu.edu
- Adam J. LeeProfessor of Computer Science, University of PittsburghEmail verificata su pitt.edu
- Rosta FarzanUniversity of PittsburghEmail verificata su pitt.edu
- Sabid Bin Habib PiasPh.D. Student, Department of Computer Science, Indiana UniversityEmail verificata su iu.edu
- A. B. M. Alim Al IslamProfessor, Department of CSE, Bangladesh University of Engineering and Technology (BUET)Email verificata su cse.buet.ac.bd
- Novia NurainPhD, Informatics, Indiana University, BloomingtonEmail verificata su iu.edu
- Anne Marie PiperUniversity of California IrvineEmail verificata su uci.edu
- Stacy BranhamAssociate Professor, UC IrvineEmail verificata su uci.edu
- Swami ManoharMicrosoft Research, LimberLink Technologies, Strand LifesciencesEmail verificata su microsoft.com
Segui
Taslima Akter
Postdoctoral researcher, University of California Irvine
Email verificata su uci.edu - Home page