Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Kai ShuAssistant Professor of Computer Science, Illinois Institute of TechnologyVerified email at iit.edu
- Yingtong DouResearch Scientist, Visa Inc.Verified email at visa.com
- Yue ZhaoAssistant Professor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
- Yuan HongUniversity of ConnecticutVerified email at uconn.edu
- Fei Wang, FAMIA, FIAHSI, FACMIProfessor at Cornell UniversityVerified email at med.cornell.edu
- Matthew A. ShapiroProfessor of Political Science, Illinois Institute of TechnologyVerified email at iit.edu
- Yunyu XiaoWeill Cornell Medicine | NewYork-Presbyterian. Department of Population Health Sciences | HealthVerified email at med.cornell.edu
- Ali CinarIllinois Institute of TechnologyVerified email at iit.edu
- Mudassir RashidIllinois Institute of TechnologyVerified email at iit.edu
- Philip TorrProfessor, University of OxfordVerified email at eng.ox.ac.uk
- Guohao LiUniversity of Oxford, CAMEL-AI.orgVerified email at robots.ox.ac.uk
- Adel BibiUniversity of OxfordVerified email at eng.ox.ac.uk
- Bernard GhanemProfessor, King Abdullah University of Science and TechnologyVerified email at kaust.edu.sa
- Ashish KunduHead of Cybersecurity Research, Cisco ResearchVerified email at acm.org
- Ali PayaniCisco SystemsVerified email at cisco.com
Follow
Canyu Chen
Ph.D. student at Illinois Institute of Technology
Verified email at hawk.iit.edu - Homepage