Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Collin McMillanUniversity of Notre DameVerified email at nd.edu
- Raul SantelicesAirbnbVerified email at airbnb.com
- Ameer ArmalyUniversity of Notre DameVerified email at nd.edu
- Haipeng CaiWashington State UniversityVerified email at wsu.edu
- Yiji ZhangAssistant Professor, Rose-Hulman Institute of TechnologyVerified email at uic.edu
- Alexander LeClairThe University of Notre DameVerified email at nd.edu
- Geguang PuProfessor of Computer Science, East China Normal UniversityVerified email at sei.ecnu.edu.cn
- Paige RodegheroClemson UniversityVerified email at clemson.edu
- Marouane KessentiniFull Professor, Oakland UniversityVerified email at oakland.edu
- Nicholas A. KraftFathomVerified email at fathom.video
- Paul W. McBurneyUniversity of VirginiaVerified email at virginia.edu
- Mohamed Wiem MkaouerRochester Institute of TechnologyVerified email at rit.edu
- Jianjun ZhaoKyushu UniversityVerified email at ait.kyushu-u.ac.jp
- Ting SuEast China Normal University, ChinaVerified email at sei.ecnu.edu.cn
- Mark GrechanikProfessor and Industry ConsultantVerified email at uic.edu
- Xiao YuResearch Manager, Machine Learning & Security, Stellar CyberVerified email at stellarcyber.ai
- Ronald MetoyerUniversity of Notre DameVerified email at nd.edu
- Qiyu ZhiResearch Scientist, Facebook IncVerified email at fb.com
- Rrezarta Krasniqi, PhDUniversity of North Carolina at CharlotteVerified email at uncc.edu
- Jincao FengEast China Normal UniversityVerified email at stu.ecnu.edu.cn