Crea il mio profilo
Accesso pubblico
Visualizza tutto27 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Haiying ShenAssociate Professor of Computer Science, University of VirginiaEmail verificata su virginia.edu
- Anna C SquicciariniPennsylvania State UniversityEmail verificata su psu.edu
- Lei YuRensselaer Polytechnic InstituteEmail verificata su rpi.edu
- Ankur SarkerUniversity of VirginiaEmail verificata su virginia.edu
- Li Yan (言浬)Xi'an Jiaotong UniversityEmail verificata su xjtu.edu.cn
- Cheng-Zhong Xu, IEEE FellowUniversity of Macau, Macau SAR, ChinaEmail verificata su um.edu.mo
- Mashrur ChowdhuryFounding Director, National Center for Transportation Cybersecurity and ResiliencyEmail verificata su clemson.edu
- Yue WangProfessor, Warren H. Owen - Duke Energy Professor of Engineering, Mechanical Engineering, ClemsonEmail verificata su clemson.edu
- kakan DeyAssociate Professor at Michigan State UniversityEmail verificata su msu.edu
- James CaverleeProfessor, Computer Science and Engineering, Texas A&M UniversityEmail verificata su cse.tamu.edu
- Ning WangRowan UniversityEmail verificata su rowan.edu
- Ce PangEmail verificata su scu.edu
- Liuhua ChenClemson UniversityEmail verificata su g.clemson.edu
- Ben WuAssociate Professor, Rowan UniversityEmail verificata su rowan.edu
- Barbara CarminatiProfessor of Computer Science, University of InsubriaEmail verificata su uninsubria.it
- Zhuozhao LiAssistant Professor, Southern University of Science and TechnologyEmail verificata su sustech.edu.cn
- Ze LiMicrosoftEmail verificata su microsoft.com
- Feng LuoProfessor, School of Computing, Clemson UniversityEmail verificata su clemson.edu
- Kang ChenSouthern Illinois UniversityEmail verificata su siu.edu
- Sarah RajtmajerThe Pennsylvania State UniversityEmail verificata su ist.psu.edu