Crea il mio profilo
Accesso pubblico
Visualizza tutto48 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jana ShakarianAssistant Research Technologist, ASUEmail verificata su asu.edu
- Eric NunesInformation Security @PayPal, Arizona State UniversityEmail verificata su asu.edu
- Gerardo I. SimariDepartment of Computer Science and Engineering, Universidad Nacional del Sur and CONICET, ArgentinaEmail verificata su cs.uns.edu.ar
- Mohammed AlmukayniziAssistant Professor at King Saud UniversityEmail verificata su asu.edu
- Ericsson MarinAssistant Professor California State Polytechnic University, PomonaEmail verificata su cpp.edu
- Elham ShaabaniWalmart LabsEmail verificata su asu.edu
- Hamidreza AlvariGoogle ResearchEmail verificata su google.com
- Ruocheng GuoByteDance Research, LondonEmail verificata su bytedance.com
- V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeEmail verificata su dartmouth.edu
- Andrew RuefEmail verificata su mimisbrunnr.net
- Soumajyoti SarkarAWS AI ResearchEmail verificata su amazon.com
- Patrick RoosPrincipal Data Scientist at Miner & KaschEmail verificata su cs.umd.edu
- Kristina LermanUSC Information Sciences InstituteEmail verificata su isi.edu
- maria luisa sapinoUniversita' di TorinoEmail verificata su di.unito.it
- Marcelo A. FalappaProfessor of Computer Science, Universidad Nacional del Sur, CONICET, ArgentinaEmail verificata su cs.uns.edu.ar
- Anthony N. JohnsonChief Scientist, Johns Hopkins University Applied Physics LaboratoryEmail verificata su jhuapl.edu
- Christian LebiereResearch Faculty, Psychology Department, Carnegie Mellon UniversityEmail verificata su cmu.edu
- Robert H ThomsonUnited States Military AcademyEmail verificata su westpoint.edu
- Simon ParsonsUniversity of Lincoln, School of Computer ScienceEmail verificata su lincoln.ac.uk
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationEmail verificata su gmu.edu