Get my own profile
Public access
View all1 article
2 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Younhee KimETRI; George Mason UniversityVerified email at etri.re.kr
Stephen McKennaProfessor, University of DundeeVerified email at computing.dundee.ac.uk
AloimonosProfessor of Computer Science, University of Maryland, Director Computer Vision LaboratoryVerified email at cs.umd.edu
Saad SiroheyGE HealthcareVerified email at med.ge.com
Ed Lawson, Wallace Lawson, Edgar L...Computer Scientist, Naval Research LabVerified email at nrl.navy.mil
Christian SchunnProfessor of Psychology, University of PittsburghVerified email at pitt.edu
Jana KoseckaGeorge Mason UniversityVerified email at gmu.edu
Larry DavisProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Roman GoldenbergGoogleVerified email at google.com
Daniel BarbaraProfessor of Computer Science, George Mason UniversityVerified email at gmu.edu
Maurizio FilipponeAssociate Professor - Statistics Program, KAUSTVerified email at kaust.edu.sa
Carlotta DomeniconiProfessor of Computer Science, George Mason UniversityVerified email at cs.gmu.edu
Cornelia FermullerResearch Scientist, Computer Vision and Human Vision, University of MarylandVerified email at cfar.umd.edu
James S. DuncanEbenezer K. Hunt Professor of Biomedical Engineering, Radiology, Electr. Engr., Yale UniversityVerified email at yale.edu