Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Sencun ZhuPennsylvania State UniversityEmail verificata su cse.psu.edu
- Xiaoqi JiaInstitute of Information Engineering, CASEmail verificata su iie.ac.cn
- Dinghao WuPennsylvania State UniversityEmail verificata su psu.edu
- Kamal TahaKhalifa University, UAEEmail verificata su ku.ac.ae
- A. Taufiq AsyhariProfessor, Monash UniversityEmail verificata su monash.edu
- Paul D YooDy Director, Data Analytics Institute, Birkbeck College, University of London, United KingdomEmail verificata su ieee.org
- Chan Yeob YeunKhalfia UniversityEmail verificata su kustar.ac.ae
- Deguang KongGoogleEmail verificata su google.com
- George KesidisProfessor of Computer Science and Engineering, Pennsylvania State University; Professor of Electrical Engineering, Pennsylvania Email verificata su engr.psu.edu
- XI XIONGComputer Science and Engineering, Pennsylvania State UniversityEmail verificata su cse.psu.edu
- Shengzhi ZhangBoston University MET CollegeEmail verificata su bu.edu
- Kun BaiAmazonEmail verificata su amazon.com
- Qijun GuTexas State UniversityEmail verificata su txstate.edu
- kichang kim인하대 정보통신공학과 교수Email verificata su inha.ac.kr
Segui
Yoon-Chan Jhi
Director of Software Security in Technology Research at Samsung SDS, Seoul, Korea
Email verificata su samsung.com