Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Younhee KimETRI; George Mason UniversityVerified email at etri.re.kr
- Stephen McKennaProfessor, University of DundeeVerified email at computing.dundee.ac.uk
- AloimonosProfessor of Computer Science, University of Maryland, Director Computer Vision LaboratoryVerified email at cs.umd.edu
- Saad SiroheyGE HealthcareVerified email at med.ge.com
- Ed Lawson, Wallace Lawson, Edgar L...Computer Scientist, Naval Research LabVerified email at nrl.navy.mil
- Christian SchunnProfessor of Psychology, University of PittsburghVerified email at pitt.edu
- Jana KoseckaGeorge Mason UniversityVerified email at gmu.edu
- Roman GoldenbergGoogleVerified email at google.com
- Daniel BarbaraProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
- Larry DavisProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
- Maurizio FilipponeAssociate Professor - Statistics Program, KAUSTVerified email at kaust.edu.sa
- Carlotta DomeniconiProfessor of Computer Science, George Mason UniversityVerified email at cs.gmu.edu
- Cornelia FermullerResearch Scientist, Computer Vision and Human Vision, University of MarylandVerified email at cfar.umd.edu
- James S. DuncanEbenezer K. Hunt Professor of Biomedical Engineering, Radiology, Electr. Engr., Yale UniversityVerified email at yale.edu