Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Zhiqiang LinDistinguished Professor of Engineering, The Ohio State UniversityEmail verificata su cse.ohio-state.edu
- Wenrui DiaoProfessor, Shandong UniversityEmail verificata su sdu.edu.cn
- Kehuan ZhangThe Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Haohuang WenThe Ohio State UniversityEmail verificata su osu.edu
- Yinqian ZhangProfessor, Southern University of Science and TechnologyEmail verificata su acm.org
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonEmail verificata su indiana.edu
- Wing Cheong LauProfessor, Department of Information Engineering, The Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Dong XuanProfessor of Computer Science and Engineering, The Ohio-State UniversityEmail verificata su cse.ohio-state.edu
- Ness ShroffDepartment of ECE and CSE, The Ohio State UniversityEmail verificata su osu.edu
- Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Brendan Dolan-GavittNew York UniversityEmail verificata su nyu.edu
- Alfred ChenAssistant Professor, University of California, IrvineEmail verificata su uci.edu
- Chaoshun ZuoThe Ohio State University