Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Rodney NielsenUniversity of North TexasVerified email at UNT.edu
- Mina ValizadehUniversity of Illinois at ChicagoVerified email at uic.edu
- Shahla FarzanaUniversity of Illinois at ChicagoVerified email at uic.edu
- Mary A. KhetaniUniversity of Illinois ChicagoVerified email at uic.edu
- Mohammad ArvanUniversity of Illinois at ChicagoVerified email at uic.edu
- Vera C KaelinUmeå University, Department of Computing ScienceVerified email at umu.se
- Michalis PapakostasSenior AI Engineer @ SourceAudio.comVerified email at sourceaudio.com
- Ankit AichNational Institutes of HealthVerified email at nih.gov
- Vangelis KarkaletsisNCSR "Demokritos"Verified email at iit.demokritos.gr
- Daniel TakabiProfessor and Director of School of Cybersecurity, Old Dominion UniversityVerified email at odu.edu
- Maria DagioglouNational Centre for Scientific Research 'Demokritos'Verified email at iit.demokritos.gr
- Cornelia CarageaUniversity of Illinois at ChicagoVerified email at uic.edu
- Pardis Ranjbar NoieyUniversity of Illinois at ChicagoVerified email at uic.edu
- Hamed KhanpourMicrosoft ResearchVerified email at microsoft.com
- Masoud Narouei, Ph.D.University of North TexasVerified email at my.unt.edu
- Luís PinaUniversity of Illinois ChicagoVerified email at uic.edu
- Flavio Di PaloAmazon ScienceVerified email at amazon.com
- Adam HairGoogleVerified email at google.com
- Heejin JeongArizona State UniversityVerified email at asu.edu
- Parian HaghighatUniversity of Illinois at ChicagoVerified email at uic.edu