Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Rodney NielsenUniversity of North TexasVerified email at UNT.edu
Mina ValizadehUniversity of Illinois at ChicagoVerified email at uic.edu
Shahla FarzanaUniversity of Illinois at ChicagoVerified email at uic.edu
Mohammad ArvanUniversity of Illinois at ChicagoVerified email at uic.edu
Mary KhetaniProfessorVerified email at uic.edu
Vera C KaelinUmeå University, Department of Computing ScienceVerified email at umu.se
Ankit AichNational Institutes of HealthVerified email at nih.gov
Michalis PapakostasSenior AI Engineer @ SourceAudio.comVerified email at sourceaudio.com
Vangelis KarkaletsisNCSR "Demokritos"Verified email at iit.demokritos.gr
Daniel TakabiProfessor and Director of School of Cybersecurity, Old Dominion UniversityVerified email at odu.edu
Maria DagioglouNational Centre for Scientific Research 'Demokritos'Verified email at iit.demokritos.gr
Cornelia CarageaUniversity of Illinois at ChicagoVerified email at uic.edu
Pardis Ranjbar NoieyUniversity of Illinois at ChicagoVerified email at uic.edu
Hamed KhanpourMicrosoft ResearchVerified email at microsoft.com
Masoud Narouei, Ph.D.University of North TexasVerified email at my.unt.edu
Heejin JeongArizona State UniversityVerified email at asu.edu
Flavio Di PaloAmazon ScienceVerified email at amazon.com
Parian HaghighatUniversity of Illinois at ChicagoVerified email at uic.edu
Luís PinaUniversity of Illinois ChicagoVerified email at uic.edu
Adam HairGoogleVerified email at google.com