Get my own profile
Public access
View all44 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Jaideep VaidyaDistinguished Professor, Rutgers UniversityVerified email at business.rutgers.edu
- Haibing LuSanta Clara UniversityVerified email at scu.edu
- Shangyu XieIllinois Institute of TechnologyVerified email at amazon.com
- Lingyu WangProfessor, Concordia UniversityVerified email at ciise.concordia.ca
- Han WangThe University of KansasVerified email at ku.edu
- Meisam MohammadyAssistant Professor at Iowa State UniversityVerified email at iastate.edu
- Hanbin HongUniversity of ConnecticutVerified email at uconn.edu
- Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
- Vijayalakshmi AtluriDistinguished Professor of Information Systems, Rutgers UniverstiyVerified email at rutgers.edu
- Rachida DssouliConcordia UniversityVerified email at concordia.ca
- Xuegang BanUniversity of Washington, SeattleVerified email at uw.edu
- Weiran LiuStaff Security Engineer, Alibaba GroupVerified email at alibaba-inc.com
- Kai ShuAssistant Professor of Computer Science, Emory UniversityVerified email at emory.edu
- Xinyu ZhangZhejiang UniversityVerified email at zju.edu.cn
- Li XiongSamuel Dobbs Professor, Computer Science, Biomedical Informatics, Emory UniversityVerified email at emory.edu
- Xiaochen LiZhejiang UniversityVerified email at zju.edu.cn
- Shuya FengPhd in UConnVerified email at uconn.edu
- Panagiotis KarrasProfessor, University of CopenhagenVerified email at di.ku.dk
- Ersin DincelliAssociate Professor of Information Systems | University of Colorado DenverVerified email at ucdenver.edu
- Yan YanUniversity of Illinois ChicagoVerified email at uic.edu