Get my own profile
Public access
View all70 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Ing-Ray ChenVirginia TechVerified email at vt.edu
Feng ChenDepartment of Computer Science, UT DallasVerified email at utdallas.edu
Sibel AdaliProfessor of Computer Science, Associate Dean of Science for Research, Rensselaer PolytechnicVerified email at cs.rpi.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
John O'DonovanTeladoc Health Inc. and Computer Science Dept., University of California, Santa BarbaraVerified email at cs.ucsb.edu
Richard Garcia-LebronUniversity of Texas at San AntonioVerified email at utsa.edu
Chang-Tien Lu, IEEE FellowComputer Science, Virginia TechVerified email at vt.edu
Alessandro OltramariBosch Center for Artificial Intelligence & Carnegie Bosch InstituteVerified email at us.bosch.com
Ding-Chau WangDepartment of Information Management, Southern Taiwan University of Science and TechnologyVerified email at stust.edu.tw
Tarek AbdelzaherUniversity of IllinoisVerified email at illinois.edu
Hasan CamBest BuyVerified email at bestbuy.com
Prasant MohapatraProfessor of Computer Science and Engineering, University of South FloridaVerified email at usf.edu
Sujoy SikdarAssistant Professor, Binghamton UniversityVerified email at binghamton.edu
Byungkyu (Jay) KangIntuit AIVerified email at intuit.com
Gulustan DoganUniversity of North Carolina WilmingtonVerified email at uncw.edu
Ted Brownprofessor computer science, queensVerified email at gc.cuny.edu
Sencun ZhuPennsylvania State UniversityVerified email at psu.edu
Xin ChenThe Pennsylvania State UniversityVerified email at psu.edu
Jennifer MangelsBaruch College, CUNYVerified email at baruch.cuny.edu