Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mohamed ShehabProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
- Halil BisginUniversity of Michigan-FlintVerified email at umich.edu
- Usman RaufHead of CRiSP Lab., Mercy UniversityVerified email at mercy.edu
- Zhiyuan weiSoftware Engineer, Rocky Mountain RobotechVerified email at mercy.edu
- Hamed AbdelhaqAn-Najah National UniversityVerified email at najah.edu
- Dimka KarastoyanovaUniversity of GroningenVerified email at rug.nl
- Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteVerified email at uncc.edu
- Ehab Al-ShaerCarnegie Mellon UniversityVerified email at cmu.edu
- Adel ShtayyehDepartment of Networks & Information Security, An-Najah National University, Nablus, PalestineVerified email at stu.najah.edu
- Yongge WangUNC CharlotteVerified email at uncc.edu
- Qi DuanCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
- George AzzopardiAssociate Professor, Computer Science, Bernoulli Institute, University of GroningenVerified email at rug.nl
- J. Haadi JafarianAssistant Professor at Department of Computer Science and Engineering, University of Colorado DenverVerified email at ucdenver.edu
- Fatih TurkmenUniversity of GroningenVerified email at rug.nl