Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Eric Fosler-LussierJohn Makhoul Professor of Computer Science & Engineering, The Ohio State UniversityVerified email at cse.ohio-state.edu
- Peter PlantingaPostdoctoral ResearcherVerified email at mail.mcgill.ca
- Yanzhang HeGoogle Inc.Verified email at google.com
- DeLiang WangProfessor of Computer Science and Engineering, Ohio State UniversityVerified email at cse.ohio-state.edu
- Kun HanFacebookVerified email at cse.ohio-state.edu
- Zhong-Qiu WangAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
- Michael I MandelAssociate Professor of Computer and Information Science at Brooklyn College, CUNYVerified email at sci.brooklyn.cuny.edu
- Andrew R. PlummerOhio State UniversityVerified email at osu.edu
- William HartmannRaytheon BBN Technologies Inc.Verified email at raytheon.com
- Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeVerified email at ntu.edu.sg
- Dr. Ayesha KhalidSenior Lecturer @ Queens University Belfast (QUB), Belfast, NI, UKVerified email at qub.ac.uk
- Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
- ZHUOLIN JIANGRTX Technology Research CenterVerified email at rtx.com