Get my own profile
Public access
View all36 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Weidong ShiUniversity of HoustonVerified email at uh.edu
Lei XuComputer Science Department, Kent State UniversityVerified email at kent.edu
Zhimin GaoAuburn University at MontgomeryVerified email at aum.edu
Guochuan ZhangZhejiang UniversityVerified email at zju.edu.cn
Nicole MegowProfessor of Mathematics and Computer Science, University of BremenVerified email at uni-bremen.de
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Klaus JansenProfessor, Computer Science, University of KielVerified email at informatik.uni-kiel.de
Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Kevin SchewiorAssistant Professor, Department of Math and CS, University of Southern DenmarkVerified email at sdu.dk
Leen StougieSenior Researcher CWI, Prof. of Operations Research Vrije Universiteit, AmsterdamVerified email at cwi.nl
José VerschaeAssociate Professor, Pontificia Universidad Católica de ChileVerified email at uc.cl
Martin GroßRWTH AachenVerified email at oms.rwth-aachen.de
Yann DisserProfessor of Mathematics, TU DarmstadtVerified email at mathematik.tu-darmstadt.de
Follow