Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- WenZhan SongGeorgia Power Mickey A. Brown Professor, Computer Engineering, University of GeorgiaVerified email at uga.edu
- Maria ValeroAssistant Professor, Kennesaw State UniversityVerified email at kennesaw.edu
- Amin PouriyehAssistant Professor of Information TechnologyVerified email at kennesaw.edu
- Quan Z. (Michael) ShengDistinguished Professor, School of Computing, Macquarie University, Sydney, AustraliaVerified email at mq.edu.au
- Reza M. PariziDecentralized Science Lab (dSL), Kennesaw State University, GA, USAVerified email at kennesaw.edu
- Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
- Xiaojing YeAssociate Professor, Department of Mathematics & Statistics, Georgia State University, Atlanta, GAVerified email at gsu.edu
- Yuan WuUniversity of MacauVerified email at um.edu.mo
- Lei ShiComputer Science, Georgia State UniversityVerified email at student.gsu.edu
- Gautam SrivastavaBrandon UniversityVerified email at brandonu.ca
- Lang TongIrwin and Joan Professor in Engineering, Cornell UniversityVerified email at ece.cornell.edu
- Qi LiEaton - Eaton Research LabVerified email at eaton.com
- Yujie GuAptivVerified email at temple.edu
- Goutham KamathComputer Science, Georgia State UniversityVerified email at student.gsu.edu
- Chi ZhangProfessor of Information Technology, Kennesaw State UniversityVerified email at kennesaw.edu
- Rick S. BlumECE Dept., Lehigh UniversityVerified email at lehigh.edu
- Qian HeUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn