Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Bo AnNanyang Technological UniversityVerified email at ntu.edu.sg
- V.S. SubrahmanianDepartment of Computer Science & ISTS, Dartmouth CollegeVerified email at dartmouth.edu
- Chunyan MiaoNanyang Technological UniversityVerified email at ntu.edu.sg
- Jiarui GanUniversity of OxfordVerified email at cs.ox.ac.uk
- Qian HanDartmouth CollegeVerified email at dartmouth.edu
- Ana BazzanUFRGSVerified email at inf.ufrgs.br
- Haipeng ChenAssistant professor of data science, William & MaryVerified email at wm.edu
- Sarit KrausProfessor Of Computer Science, Bar-Ilan UniversityVerified email at cs.biu.ac.il
- Yeng Chai SohNanyang Technological UniversityVerified email at ntu.edu.sg
- Cristian MolinaroUniversity of CalabriaVerified email at dimes.unical.it
- Giancarlo SperlìUniversity of Naples "Federico II"Verified email at unina.it
- Antonio PicarielloProfessor - University of Naples Federico II - DIETIVerified email at unina.it
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Mengchen ZhaoSouth China University of TechnologyVerified email at scut.edu.cn
- Roy LindelaufAssistant professor Quantitative Intelligence Analysis, NL Defence AcademyVerified email at mindef.nl
- Giridhar Kaushik RamachandranGeorge Mason UniversityVerified email at gmu.edu
- Dongkai ChenGoogleVerified email at google.com