Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sang-Yoon ChangUniversity of Colorado Colorado SpringsVerified email at uccs.edu
- Xiaobo ZhouUniversity of Macau; UCCSVerified email at um.edu.mo
- Jinoh KimAssociate Professor, Texas A&M University-CommerceVerified email at tamuc.edu
- Wenjun FANXi'an Jiaotong-Liverpool UniversityVerified email at xjtlu.edu.cn
- Manohar RaaviKennesaw State UniversityVerified email at kennesaw.edu
- Hsiang-Jen HongWestern Washington UniversityVerified email at wwu.edu
- Makiya NakashimaCleveland ClinicVerified email at ccf.org
- Pranav ChandramouliUniversity of Colorado Colorado SpringsVerified email at uccs.edu
- Arijet SarkerAssistant ProfessorVerified email at floridapoly.edu
- Kelei ZhangInstructor at Informatics, Fort Hays State UniversityVerified email at fhsu.edu
- Younghee ParkComputer Engineering, San Jose State UniversityVerified email at sjsu.edu
- C. Edward ChowUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
- Kay YoonUniversity of Colorado Colorado SpringsVerified email at uccs.edu
- Nazmus SakibPhD Candidate, University of Colorado Colorado SpringsVerified email at uccs.edu
- Ken LewUniversity of Colorado Colorado SpringsVerified email at uccs.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu