Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Apu KapadiaProfessor of Computer Science, Indiana UniversityVerified email at indiana.edu
- Tousif AhmedPrivacy Engineer & Applied Privacy Researcher @ GoogleVerified email at google.com
- Bryan SemaanAssociate Professor, University of Colorado BoulderVerified email at colorado.edu
- Bryan DosonoPhD, Information Science and TechnologyVerified email at syr.edu
- Yasmeen RashidiAsst. Prof. of Informatics, Umm Al-Qura Uni, PhD (Security Informatics-Indiana Uni)Verified email at uqu.edu.sa
- Ashikur RahmanProfessor, Department of Computer Science & Engg. (CSE), Bangladesh Univ. of Engg. & Tech. (BUETVerified email at cse.buet.ac.bd
- Mashrura TasnimUniversity of AlbertaVerified email at ualberta.ca
- Imtiaz AhmadGrand Valley State UniversityVerified email at gvsu.edu
- Adam J. LeeProfessor of Computer Science, University of PittsburghVerified email at pitt.edu
- Rosta FarzanUniversity of PittsburghVerified email at pitt.edu
- Sabid Bin Habib PiasPh.D. Student, Department of Computer Science, Indiana UniversityVerified email at iu.edu
- A. B. M. Alim Al IslamProfessor, Department of CSE, Bangladesh University of Engineering and Technology (BUET)Verified email at cse.buet.ac.bd
- Novia NurainPhD, Informatics, Indiana University, BloomingtonVerified email at iu.edu
- Anne Marie PiperUniversity of California IrvineVerified email at uci.edu
- Stacy BranhamAssociate Professor, UC IrvineVerified email at uci.edu
- Swami ManoharMicrosoft Research, LimberLink Technologies, Strand LifesciencesVerified email at microsoft.com
Follow
Taslima Akter
Postdoctoral researcher, University of California Irvine
Verified email at uci.edu - Homepage