Crea il mio profilo
Accesso pubblico
Visualizza tutto53 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Younghee ParkComputer Engineering, San Jose State UniversityEmail verificata su sjsu.edu
- Simeon WuthierUniversity of Colorado, Colorado SpringsEmail verificata su uccs.edu
- Yih-Chun HuAssociate Professor of Electrical and Computer Engineering, University of IllinoisEmail verificata su illinois.edu
- Wenjun FANXi'an Jiaotong-Liverpool UniversityEmail verificata su xjtlu.edu.cn
- Xiaobo ZhouUniversity of Macau and UCCSEmail verificata su um.edu.mo
- Jinoh KimAssociate Professor, Texas A&M University-CommerceEmail verificata su tamuc.edu
- Manohar RaaviKennesaw State UniversityEmail verificata su kennesaw.edu
- Hsiang-Jen HongWestern Washington UniversityEmail verificata su wwu.edu
- Arijet SarkerGraduate Research Assistant and Graduate Teaching AssistantEmail verificata su uccs.edu
- J HarshanIndian Institute of Technology DelhiEmail verificata su ee.iitd.ac.in
- David K Y YauSingapore University of Technology and DesignEmail verificata su sutd.edu.sg
- Subhash LakshminarayanaUniversity of Warwick, School of EngineeringEmail verificata su warwick.ac.uk
- Kelei ZhangInstructor at Informatics, Fort Hays State UniversityEmail verificata su fhsu.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsEmail verificata su uccs.edu
- Jugal KalitaUniversity of Colorado, Colorado SpringsEmail verificata su uccs.edu