Get my own profile
Public access
View all17 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Daniel GrosuAssociate Professor of Computer Science, Wayne State UniversityVerified email at wayne.edu
- Mark NejadAssociate Professor, University of DelawareVerified email at udel.edu
- Weibin MaPhD in Computer Science, University of DelawareVerified email at udel.edu
- Ratna Babu Chinnam, Ph.D.Professor & Chair of Industrial & Systems Engineering, Wayne State UniversityVerified email at wayne.edu
- Erfan Farhangi MalekiPh.D. in Computer Science, University of DelawareVerified email at udel.edu
- Dixit BhattaSr. Application EngineerVerified email at concurrent-rt.com
- Weisong ShiAlumni Distinguished Professor at University of Delaware, IEEE FellowVerified email at udel.edu
- Nafiseh SharghivandResearch Fellow at SUTDVerified email at sutd.edu.sg
- Quan ZhangSoftware Engineer at GoogleVerified email at wayne.edu
- Haoran WeiMicrosoftVerified email at udel.edu
- Seyed Morteza NabavinejadWorcester Polytechnic Institute (WPI)Verified email at wpi.edu
- Farnaz DerakhshanNortheastern UniversityVerified email at northeastern.edu
- Nathan FisherWayne State UniversityVerified email at wayne.edu
- Humberto J. La RocheCisco SystemsVerified email at cisco.com
- Safraz RampersaudWayne State UniversityVerified email at wayne.edu
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
- Adel N. ToosiFaculty of Information Technology, Monash UniversityVerified email at monash.edu
- Schahram DustdarProfessor of Computer Science, Member of Academia Europaea, IEEE|EAI|AAIA Fellow, TU Wien, AustriaVerified email at dsg.tuwien.ac.at
- Sherief RedaProfessor, Brown University | Amazon ScholarVerified email at brown.edu
Follow
Lena Mashayekhy
Associate Professor of Computer Science, University of Delaware
Verified email at udel.edu - Homepage