Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityEmail verificata su psu.edu
- Jun XuAssistant Professor at The University of UtahEmail verificata su cs.utah.edu
- Thomas MaillartUniversity of GenevaEmail verificata su unige.ch
- Jorge LoboICREA - Universitat Pompeu FabraEmail verificata su upf.edu
- Minghui ZhuAssociate Professor, Electrical Engineering and Computer Science, Pennsylvania State UniversityEmail verificata su psu.edu
- Pinyao GuoPennsylvania State UniversityEmail verificata su ist.psu.edu
- John ChuangProfessor, UC Berkeley School of InformationEmail verificata su ischool.berkeley.edu
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Dinghao WuPennsylvania State UniversityEmail verificata su psu.edu
- Chen ZhongThe University of TampaEmail verificata su ut.edu
- Dr. Poonam YadavA/ Professor and Lecturer at University of York / Visiting Researcher at University of CambridgeEmail verificata su york.ac.uk
- Nicklaus A. GiacobeCollege of Information Sciences and Technology,The Pennsylvania State UniversityEmail verificata su ist.psu.edu
- Neela SawantResearch Scientist at Amazon.com (Past: Yahoo! R&D India, Penn State University, IIT Bombay)Email verificata su amazon.com
- Fan YeProfessor of ECE, Stony Brook UniversityEmail verificata su stonybrook.edu
- Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Email verificata su cs.columbia.edu