Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Wen YaoResearcher Scientist, HP LabsEmail verificata su hp.com
- Zang LiResearch Scientist, Linkedin, DiDi, TencentEmail verificata su linkedin.com
- Jungyoon KimKent State UniversityEmail verificata su kent.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Ya ZhangShanghai Jiao Tong UniversityEmail verificata su sjtu.edu.cn
- Heng XuProfessor of Management, Warrington College of Business, University of FloridaEmail verificata su ufl.edu
- Shuihua Hanxiamen universityEmail verificata su xmu.edu.cn
- Fengjun LiUniversity of KansasEmail verificata su ku.edu
- Dongwon LeeProfessor, The Pennsylvania State UniversityEmail verificata su psu.edu
- Yiling ChenHarvard UniversityEmail verificata su seas.harvard.edu
- Mithu BhattacharyaProfessor of Decision Sciences, University of Detroit MercyEmail verificata su udmercy.edu
- Ding Wang(汪 定)College of Cyber Science, Nankai University, Tianjin 300350, ChinaEmail verificata su nankai.edu.cn
- Wang-Chien LeePennsylvania State UniversityEmail verificata su cse.psu.edu
- Sencun ZhuPennsylvania State UniversityEmail verificata su cse.psu.edu
- Dan ZhuIowa State UniversityEmail verificata su iastate.edu
- Prasenjit MitraVisiting Professor, L3S Research Ctr., Leibniz Universitat Hannover & Prof. of IST, Penn State Univ.Email verificata su psu.edu
- Akhil KumarPenn State UniversityEmail verificata su psu.edu
- Alex Hai WangApple, Hitachi, Verisign, Penn StateEmail verificata su apple.com
- Thin Yin LeongSingapore University of Social SciencesEmail verificata su suss.edu.sg
- Xiaodan WuProfessor of Management Science, Hebei Unviersity of Technology
Segui
Chao-Hsien Chu 朱昭贤
Professor of Information Sciences and Technology, Pennsylvania State University
Email verificata su ist.psu.edu - Home page