Crea il mio profilo
Accesso pubblico
Visualizza tutto25 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Bo LuoProfessor, The University of KansasEmail verificata su ku.edu
- Jingqiang LinProfessor, University of Science and Technology of ChinaEmail verificata su ustc.edu.cn
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Abdulmalik HumayedJazan UniversityEmail verificata su jazanu.edu.sa
- Lei YangAmazonEmail verificata su amazon.com
- Dongwon LeeProfessor, The Pennsylvania State UniversityEmail verificata su psu.edu
- Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityEmail verificata su ist.psu.edu
- Bingyu LiSchool of Cyber Science and Technology, Beihang UniversityEmail verificata su buaa.edu.cn
- Qiaozhi (Betty) WangApple, University of KansasEmail verificata su ku.edu
- Jia Yu(于佳)Professor of Computer Science, Qingdao UniversityEmail verificata su qdu.edu.cn
- Hanlin ZhangQingdao UniversityEmail verificata su qdu.edu.cn
- Chengliang TianAssociate Prof, Qingdao UniversityEmail verificata su qdu.edu.cn
- Le GuanSchool of Computing at the University of GeorgiaEmail verificata su uga.edu
- Jake Y. Chen, PhD, FACMI, FAIMBEUniversity of Alabama at Birmingham (UAB) School of MedicineEmail verificata su uab.edu
- Yuhao YangMicrosoft | University of KansasEmail verificata su microsoft.com
- Hyunjin SeoOscar Stauffer Professor/Associate Dean, University of Kansas; Center for Digital Inclusion DirectorEmail verificata su ku.edu
- Wang-Chien LeePennsylvania State UniversityEmail verificata su cse.psu.edu
- Prasenjit MitraVisiting Professor, L3S Research Ctr., Leibniz Universitat Hannover & Prof. of IST, Penn State Univ.Email verificata su psu.edu
- Roseann PlurettiUniversity of KansasEmail verificata su ku.edu
- Wing Shing WongChinese University of Hong KongEmail verificata su ie.cuhk.edu.hk