Get my own profile
Public access
View all17 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
- Shelia Kennison, ProfessorDepartment of Psychology, Oklahoma State UniversityVerified email at okstate.edu
- Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
- Mohammed AbuhamadLoyola University ChicagoVerified email at luc.edu
- Yanmin GongUniversity of Texas at San AntonioVerified email at utsa.edu
- Tamer ABUHMEDCollege of Computing and Informatics, Sungkyunkwan UniversityVerified email at skku.edu
- Denis Foo KuneAmazon Web ServicesVerified email at amazon.com
- Peng WangQualcommVerified email at qti.qualcomm.com
- Eugene VassermanKansas State UniversityVerified email at ksu.edu
- Loretta StalansLoyola University ChicagoVerified email at luc.edu
- Praveen khethavathLaGuardia Community CollegeVerified email at lagcc.cuny.edu
- Yuanxiong GuoUniversity of Texas at San AntonioVerified email at utsa.edu
- Victor HeorhiadiAWSVerified email at victorh.net
- Jinoh KimAssociate Professor, Texas A&M University-CommerceVerified email at tamuc.edu
Follow
Eric Chan-Tin
Associate Professor of Cybersecurity, Loyola University Chicago
Verified email at cs.luc.edu - Homepage