Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Mohamed ShehabProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Halil BisginUniversity of Michigan-FlintVerified email at umich.edu
Usman RaufHead of CRiSP Lab., Mercy UniversityVerified email at mercy.edu
Zhiyuan weiSoftware Engineer, Rocky Mountain RobotechVerified email at mercy.edu
Dimka KarastoyanovaUniversity of GroningenVerified email at rug.nl
Hamed AbdelhaqAn-Najah National UniversityVerified email at najah.edu
Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteVerified email at uncc.edu
Ehab Al-ShaerCarnegie Mellon UniversityVerified email at cmu.edu
Yongge WangUNC CharlotteVerified email at uncc.edu
Qi DuanCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Adel ShtayyehDepartment of Networks & Information Security, An-Najah National University, Nablus, PalestineVerified email at stu.najah.edu
Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
George AzzopardiAssociate Professor, Computer Science, Bernoulli Institute, University of GroningenVerified email at rug.nl
J. Haadi JafarianAssistant Professor at Department of Computer Science and Engineering, University of Colorado DenverVerified email at ucdenver.edu
Fatih TurkmenUniversity of GroningenVerified email at rug.nl