Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Meliha YetisgenProfessor, University of WashingtonVerified email at uw.edu
- Ozlem UzunerGeorge Mason UniversityVerified email at gmu.edu
- Yujuan "Velvin" FuUniversity of WashingtonVerified email at uw.edu
- Noseong ParkTenured Associate Professor, KAISTVerified email at kaist.ac.kr
- Ching-Huei TsouIBM ResearchVerified email at us.ibm.com
- Diwakar MahajanApplied Scientist, IBM Research / MIT-IBM Watson AI LabVerified email at columbia.edu
- Jennifer LiangIBM TJ Watson Research CenterVerified email at us.ibm.com
- Rajesh GanesanGeorge Mason UniversityVerified email at gmu.edu
- V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
- Yanhai XiongAsst Prof, William & MaryVerified email at wm.edu
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Vadim SokolovGeorge Mason UniversityVerified email at gmu.edu