Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
6 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationEmail verificata su gmu.edu
- Douglas ReevesProfessor of Computer Science, N.C. State UniversityEmail verificata su ncsu.edu
- Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityEmail verificata su ncsu.edu
- Yao LiuProfessor of Computer Science, University of South FloridaEmail verificata su cse.usf.edu
- Wenliang DuSyracuse UniversityEmail verificata su ecs.syr.edu
- An LiuGoogleEmail verificata su google.com
- X. Sean WangSchool of Computer Science, Fudan UniversityEmail verificata su fudan.edu.cn
- Ahmed M. AzabFacebookEmail verificata su fb.com
- Wenbo ShenZhejiang UniversityEmail verificata su zju.edu.cn
- Kun SunGeorge Mason UniversityEmail verificata su gmu.edu
- cliff wangNCSUEmail verificata su ncsu.edu
- Ruowen WangGoogle, Samsung Research America, North Carolina State UniversityEmail verificata su google.com
- Sencun ZhuPennsylvania State UniversityEmail verificata su psu.edu
- Attila A YavuzAssociate Professor, University of South FloridaEmail verificata su usf.edu
- Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityEmail verificata su fudan.edu.cn
- Yuan ZhangProfessor, School of Computer Science, Fudan UniversityEmail verificata su fudan.edu.cn
- Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityEmail verificata su cse.tamu.edu
- Wu ZhouDidi LabsEmail verificata su didichuxing.com
- Jia MaGoogle IncEmail verificata su google.com
- William EnckProfessor of Computer Science, North Carolina State UniversityEmail verificata su ncsu.edu