Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Hung Viet PhamAssistant Professor, York UniversityEmail verificata su yorku.ca
- Nan JiangComputer Science Department, Purdue UniversityEmail verificata su purdue.edu
- Nenad MedvidovicProfessor of Computer Science, University of Southern CaliforniaEmail verificata su usc.edu
- Derek RaysideUniversity of WaterlooEmail verificata su uwaterloo.ca
- Joshua GarciaUniversity of California, IrvineEmail verificata su uci.edu
- Yaoliang YuUniversity of WaterlooEmail verificata su uwaterloo.ca
- Weizhen QiUniversity of Science and Technology of ChinaEmail verificata su mail.ustc.edu.cn
- Nachiappan NagappanFacebookEmail verificata su fb.com
- Kommy Weldemariam, DirectorAmazonEmail verificata su cs.queensu.ca
- Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaEmail verificata su uwf.edu
- Jiahao Chen 陳家豪Owner, Responsible AI LLCEmail verificata su mit.edu
- Cristian CadarImperial College LondonEmail verificata su imperial.ac.uk
- Tomasz KuchtaComputer Scientist | Mobile Security @ Samsung ElectronicsEmail verificata su alumni.imperial.ac.uk