Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- John YenProfessor of Data Sciences, The Pennsylvania State UniversityEmail verificata su psu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Hong LiuIndiana University KokomoEmail verificata su iu.edu
- Awny AlnusairAssociate Professor at Indiana UniversityEmail verificata su iu.edu
- TAO LINGoogleEmail verificata su google.com
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Hasan CamBest BuyEmail verificata su bestbuy.com
- Sheikh Rabiul IslamRutgers University - CamdenEmail verificata su rutgers.edu
- Mingyi ZhaoNotionEmail verificata su makenotion.com
- Bo ChenAssociate Professor of Computer Science, Michigan Technological UniversityEmail verificata su mtu.edu
- Christopher GarneauU.S. Army DEVCOM Analysis CenterEmail verificata su army.mil
- Atif AlamriProfessor, King Saud UniversityEmail verificata su ksu.edu.sa
- Majdi RawashdehPrincess Sumaya University for Technology && Al Yamamah UniversityEmail verificata su psut.edu.jo
- Jun XuAssistant Professor at The University of UtahEmail verificata su cs.utah.edu
- M. Shamim HossainProfessor, Highly Cited Researcher, King Saud UniversityEmail verificata su ksu.edu.sa
- Jun YaoUniversity of Texas at ArlingtonEmail verificata su mavs.uta.edu
- Alex MartakisGraduate Student, University of California - San DiegoEmail verificata su ucsd.edu
- J.B. (Joo Baek) KimUniversity of TampaEmail verificata su ut.edu
- Neela SawantResearch Scientist at Amazon.com (Past: Yahoo! R&D India, Penn State University, IIT Bombay)Email verificata su amazon.com
- Nicklaus A. GiacobeCollege of Information Sciences and Technology,The Pennsylvania State UniversityEmail verificata su ist.psu.edu