Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Adam BatesAssistant Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Gang WangAssociate Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Wajih Ul HassanAssistant Professor, University of VirginiaEmail verificata su virginia.edu
- Muhammad Adil InamUniversity of Illinois Urbana ChampaignEmail verificata su illinois.edu
- Linhai SongAssociate Professor, Pennsylvania State UniversityEmail verificata su ist.psu.edu
- Shuofei ZhuPenn State UniversityEmail verificata su psu.edu
- Aiping XiongThe Pennsylvania State UniversityEmail verificata su psu.edu
- Natã M. BarbosaNetflixEmail verificata su netflix.com
- Licheng LuoUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Olivia FigueiraPhD Student at University of California, IrvineEmail verificata su uci.edu
- Yang WangAssociate Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Yinfang ChenUniversity of Illinois Urbana-ChampaignEmail verificata su illinois.edu
- Sascha FahlCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Yasemin AcarPaderborn University & The George Washington UniversityEmail verificata su sec.uni-hannover.de
- Juliane SchmüserCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Adam J AvivThe George Washington UniversityEmail verificata su email.gwu.edu
- Amanda Rose YuilePostdoc, Purdue UniversityEmail verificata su purdue.edu
- Hadjer BenkraoudaPh.D. Student, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Daniel VotipkaTufts UniversityEmail verificata su cs.tufts.edu
- Limin YangTiktok, PhD from University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu