Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
11 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yan Lindsay SunUniversity of Rhode IslandEmail verificata su uri.edu
- Behnam DezfouliAssociate Professor, Computer Science & Engineering, Santa Clara University, USAEmail verificata su scu.edu
- haipeng pengBeijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateEmail verificata su psu.edu
- Bhagyashri TushirPhD Student @ SIOT Lab, Santa Clara University, USAEmail verificata su scu.edu
- He (Helen) HuangNorth Carolina State University & University of North Carolina at Chapel HillEmail verificata su ncsu.edu
- Lixiang Li(李丽香)Professor in School of Cyberspace Security, Beijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Jun JiangPh.D. Candidate, Santa Clara UniversityEmail verificata su scu.edu
- Syed S RizviPennsylvania State UniversityEmail verificata su psu.edu
- Xiaorong ZhangSan Francisco State UniversityEmail verificata su sfsu.edu
- Jin RenUniversity of Rhode IslandEmail verificata su ele.uri.edu
- Na LiAssociate Professor, Prairie View A&M UniversityEmail verificata su pvamu.edu
- Wenqi ZhouAssociate Professor of Information Systems Management, Duquesne UniversityEmail verificata su duq.edu
- Xiaojun RuanAssociate Professor of Computer Science, California State University, East BayEmail verificata su csueastbay.edu
- Yafei YangQualcomm Inc.Email verificata su ele.uri.edu
- Siyuan LiuLecturer, NTU, SingaporeEmail verificata su ntu.edu.sg
- Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Ting YuQatar Computing Research Institute (QCRI)Email verificata su ncsu.edu