Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Shomir WilsonAssistant Professor, Pennsylvania State UniversityEmail verificata su psu.edu
- Mads Schaarup AndersenSenior Usable Security ExpertEmail verificata su alexandra.dk
- Florian SchaubUniversity of MichiganEmail verificata su umich.edu
- Sebastian ZimmeckAssistant Professor of Computer Science, Wesleyan UniversityEmail verificata su wesleyan.edu
- Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Frederick LiuGoogleEmail verificata su google.com
- Kanthashree Mysore SathyendraAmazonEmail verificata su amazon.com
- Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityEmail verificata su law.fordham.edu
- Josef van GenabithDFKI German Research Center for Artificial IntelligenceEmail verificata su dfki.de
- Yiu-Chang LinAppleEmail verificata su apple.com
- Declan GrovesSenior Applied Scientist, MicrosoftEmail verificata su microsoft.com
- Antonio ToralAssistant Professor, University of GroningenEmail verificata su rug.nl
- Sandipan DandapatMicrosoft, IndiaEmail verificata su microsoft.com
- Qun LiuNoah's Ark Lab, HuaweiEmail verificata su huawei.com
- Avinesh P.V.SNLP and ML ScientistEmail verificata su apple.com