Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Rodney NielsenUniversity of North TexasEmail verificata su UNT.edu
- Mina ValizadehUniversity of Illinois at ChicagoEmail verificata su uic.edu
- Shahla FarzanaUniversity of Illinois at ChicagoEmail verificata su uic.edu
- Mary A. KhetaniUniversity of Illinois ChicagoEmail verificata su uic.edu
- Mohammad ArvanUniversity of Illinois at ChicagoEmail verificata su uic.edu
- Vera C KaelinUmeå University, Department of Computing ScienceEmail verificata su umu.se
- Michalis PapakostasSenior AI Engineer @ SourceAudio.comEmail verificata su sourceaudio.com
- Ankit AichNational Institutes of HealthEmail verificata su nih.gov
- Vangelis KarkaletsisNCSR "Demokritos"Email verificata su iit.demokritos.gr
- Daniel TakabiProfessor and Director of School of Cybersecurity, Old Dominion UniversityEmail verificata su odu.edu
- Maria DagioglouNational Centre for Scientific Research 'Demokritos'Email verificata su iit.demokritos.gr
- Cornelia CarageaUniversity of Illinois at ChicagoEmail verificata su uic.edu
- Pardis Ranjbar NoieyUniversity of Illinois at ChicagoEmail verificata su uic.edu
- Hamed KhanpourMicrosoft ResearchEmail verificata su microsoft.com
- Masoud Narouei, Ph.D.University of North TexasEmail verificata su my.unt.edu
- Flavio Di PaloAmazon ScienceEmail verificata su amazon.com
- Luís PinaUniversity of Illinois ChicagoEmail verificata su uic.edu
- Adam HairGoogleEmail verificata su google.com
- Heejin JeongArizona State UniversityEmail verificata su asu.edu
- Parian HaghighatUniversity of Illinois at ChicagoEmail verificata su uic.edu