Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Guang GongProfessor, Dept. ECE, University of WaterlooEmail verificata su uwaterloo.ca
- Lei XuComputer Science Department, Kent State UniversityEmail verificata su kent.edu
- Kalikinkar MandalAssistant Professor at University of New Brunswick, FrederictonEmail verificata su uwaterloo.ca
- Daniel EngelsEmail verificata su alum.mit.edu
- Lin ChenDepartment of computer science, Texas Tech UniversityEmail verificata su ttu.edu
- Weidong ShiUniversity of HoustonEmail verificata su uh.edu
- Zhimin GaoAuburn University at MontgomeryEmail verificata su aum.edu
- Bo ZhuUniversity of WaterlooEmail verificata su uwaterloo.ca
- Boyang WangUniversity of CincinnatiEmail verificata su uc.edu
- Francesco SicaFlorida Atlantic UniversityEmail verificata su fau.edu
- David JaoUniversity of WaterlooEmail verificata su uwaterloo.ca
- Qingji ZhengEmail verificata su my.utsa.edu
- Lei YangAmazonEmail verificata su amazon.com
- Raullen ChaiUniversity of WaterlooEmail verificata su engmail.uwaterloo.ca
- Gangqiang YangUniversity of WaterlooEmail verificata su uwaterloo.ca
- Berry SchoenmakersAssociate Professor, TU EindhovenEmail verificata su tue.nl
- Teng WuECE, university of waterlooEmail verificata su uwaterloo.ca
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsEmail verificata su uccs.edu
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumEmail verificata su rub.de