Get my own profile
Public access
View all10 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Reza LangariProfessor of Mechanical Engineering, Texas A&M UniversityVerified email at tamu.edu
Kang ZhaoAssociate Professor and Tippie Research Fellow, University of IowaVerified email at uiowa.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Magy Seif El-NasrUniversity of California at Santa CruzVerified email at ucsc.edu
Baojun QiueBay Inc./Pennsylvania State UniversityVerified email at ebay.com
C Lee GilesPennsylvania State UniversityVerified email at psu.edu
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Hyun-Woo "Anthony" KimThe Pennsylvania State UniversityVerified email at ist.psu.edu
Lotfi A. ZadehProfessor Emeritus, EECS, UC BerkeleyVerified email at eecs.berkeley.edu
Bernard J. (Jim) JansenQatar Computing Research Institute, HBKUVerified email at acm.org
Shenghuo Zhu (朱胜火)AibeeVerified email at aibee.com
Linjun YangFacebookVerified email at fb.com
John Yen
University Professor of Information Sciences and Technology, The Pennsylvania State University
Verified email at ist.psu.edu