Get my own profile
Public access
View all53 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Younghee ParkComputer Engineering, San Jose State UniversityVerified email at sjsu.edu
- Simeon WuthierUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
- Yih-Chun HuAssociate Professor of Electrical and Computer Engineering, University of IllinoisVerified email at illinois.edu
- Wenjun FANXi'an Jiaotong-Liverpool UniversityVerified email at xjtlu.edu.cn
- Xiaobo ZhouUniversity of Macau and UCCSVerified email at um.edu.mo
- Jinoh KimAssociate Professor, Texas A&M University-CommerceVerified email at tamuc.edu
- Manohar RaaviKennesaw State UniversityVerified email at kennesaw.edu
- Hsiang-Jen HongWestern Washington UniversityVerified email at wwu.edu
- Arijet SarkerGraduate Research Assistant and Graduate Teaching AssistantVerified email at uccs.edu
- J HarshanIndian Institute of Technology DelhiVerified email at ee.iitd.ac.in
- David K Y YauSingapore University of Technology and DesignVerified email at sutd.edu.sg
- Subhash LakshminarayanaUniversity of Warwick, School of EngineeringVerified email at warwick.ac.uk
- Kelei ZhangInstructor at Informatics, Fort Hays State UniversityVerified email at fhsu.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- Jugal KalitaUniversity of Colorado, Colorado SpringsVerified email at uccs.edu