Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jinho HwangFacebookEmail verificata su fb.com
- Maja VukovicIBM T.J. Watson Research CenterEmail verificata su us.ibm.com
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- C Lee GilesPennsylvania State UniversityEmail verificata su psu.edu
- Prasenjit MitraVisiting Professor, L3S Research Ctr., Leibniz Universitat Hannover & Prof. of IST, Penn State Univ.Email verificata su psu.edu
- Min LiSenior Software Engineer-Virtualization, FireEyeEmail verificata su vcu.edu
- Yulong ZhangGoogleEmail verificata su google.com
- Sencun ZhuPennsylvania State UniversityEmail verificata su cse.psu.edu
- Jill JermynColumbia UniversityEmail verificata su cs.columbia.edu
- Haining WangProfessor of ECE, Virginia TechEmail verificata su vt.edu
- hai huangIBM ResearchEmail verificata su us.ibm.com
- Liangcai GaoPeking UniversityEmail verificata su pku.edu.cn
- Michael NiddIBM ResearchEmail verificata su zurich.ibm.com
- Nikos AnerousisIBM TJ Watson Research CenterEmail verificata su us.ibm.com
- Alex Hai WangApple, Hitachi, Verisign, Penn StateEmail verificata su apple.com
- Lakshminarayanan(LN) Renganaraya...AdobeEmail verificata su adobe.com
- Ea-Ee JanIBMEmail verificata su us.ibm.com
- James Z. WangDistinguished Professor, Informatics, Data Sciences, and HCI, Penn StateEmail verificata su ist.psu.edu
- Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaEmail verificata su samsung.com
- Xiaoqi JiaInstitute of Information Engineering, CASEmail verificata su iie.ac.cn