Get my own profile
Public access
View all10 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Shengli ZhouProfessor of Electrical and Computer Engineering, University of ConnecticutVerified email at uconn.edu
- Jianzhong HuangUniversity of ConnecticutVerified email at lsi.com
- Lei WanXiamen UniversityVerified email at xmu.edu.cn
- Jun-Hong CuiUniversity of ConnecticutVerified email at engr.uconn.edu
- Peter WillettUniversity of ConnecticutVerified email at uconn.edu
- Zhengdao WangProfessor of Cybersecurity Engineering, George Mason UniversityVerified email at gmu.edu
- Zheng PengCity University of New York, City College, Grove School of Engineering, Computer Science DepartmentVerified email at ccny.cuny.edu
- Yougan ChenAssociate Professor of Applied Marine Physics and Engineering, Xiamen UniversityVerified email at xmu.edu.cn
- Michael ZubaPh.D., Department of Computer Science and Engineering, University of ConnecticutVerified email at engr.uconn.edu
- Xiaoka XuASML US LLCVerified email at asml.com
- Zhijie Jerry ShiUniversity of ConnecticutVerified email at uconn.edu
- Krishna PattipatiDistinguished Professor Emeritus, Dept. of ECEVerified email at uconn.edu
- Georgios B. GiannakisMcKnight Presidential Chair in ECE Dept., University of MinnesotaVerified email at umn.edu
- Haixin SunAssociate professor of Signal Processing, Xiamen UniversityVerified email at xmu.edu.cn
- Lance FiondellaAssociate Professor, University of Massachusetts DartmouthVerified email at umassd.edu
- Songtao LuSenior Research Scientist, IBM Thomas J. Watson Research Center | MIT-IBM Watson AI Lab | RPI-IBMVerified email at ibm.com
Follow
Zhaohui Wang
Associate Professor, Michigan Technological University
Verified email at mtu.edu - Homepage