Get my own profile
Public access
View all60 articles
1 article
available
not available
Based on funding mandates
Co-authors
Xinning GuiAssistant Professor, College of IST, The Pennsylvania State UniversityVerified email at psu.edu
Mayara Costa FigueiredoUniversidade Federal do ParáVerified email at ufpa.br
Clara CaldeiraGoogleVerified email at google.com
Sun Young ParkUniversity of Michigan, School of Information, Stamps School of Art and DesignVerified email at umich.edu
Daniel A. EpsteinAssociate Professor, University of California, IrvineVerified email at ics.uci.edu
Tera L. ReynoldsAssistant Professor of Information Systems, UMBCVerified email at umbc.edu
Yubo KouAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Zhaoyuan SuMetaVerified email at uci.edu
Xi LuUniversity at Buffalo, SUNYVerified email at buffalo.edu
Steven R. RickMassachusetts Institute of Technology & NVIDIAVerified email at mit.edu
Melissa MazmanianProfessor, Department of Informatics, University of California, IrvineVerified email at uci.edu
Lu HeUniversity of Wisconsin-MilwaukeeVerified email at uwm.edu
Xianghua (Sharon) DingUniversity of GlasgowVerified email at glasgow.ac.uk
Changyang HeMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
David A HanauerUniversity of MichiganVerified email at umich.edu
isil oygurAssistant professor of Industrial Design, University of CincinnatiVerified email at uc.edu
Xiaojuan MaHong Kong University of Science and TechnologyVerified email at ust.hkKai ZhengProfessor of Informatics and Emergency Medicine, University of California, IrvineVerified email at uci.edu
Naja Holten MøllerAssociate professorVerified email at di.ku.dk
Xinru PageBrigham Young UniversityVerified email at cs.byu.edu