0

Ryan McMahan

Dr. Ryan P. McMahan is an Associate Professor of Computer Science at the University of Central Florida (UCF). He directs the eXtended Reality & Training (XRT) Lab, which focuses on […]

0

Agoritsa Polyzou

Dr. Polyzou is an Assistant Professor at the Knight Foundation School of Computing and Information Sciences at Florida International University (FIU), Miami. Agoritsa received her Ph.D. degree in [...]

0

Yanzhao Wu

Dr. Wu is an assistant professor in Computer Science at Florida International University. His research interest lies at the intersection of systems and deep learning, especially systems [...]

0

Carter Tiernan

Dr. J. Carter M. Tiernan is the Assistant Dean for Diversity, Equity, Inclusion, and Student Affairs in the College of Engineering at the University of Texas at Arlington. Since becoming […]

0

Paul Gazzillo

Paul Gazzillo is an Assistant Professor of Computer Science at University of Central Florida. His research aims to make it easier to develop safe and secure software, and it spans program […]

0

Mohammadhadi Amini

Dr. M. Hadi Amini is an Assistant Professor of Computer Science at Florida International University. He is the director of Sustainability, Optimization, and Learning for InterDependent networks [...]

0

Chen Chen

Dr. Chen Chen is an Assistant Professor at the Center for Research in Computer Vision (CRCV) at the University of Central Florida. His research interests include computer vision, machine [...]

0

Wenqian Dong

Wenqian Dong is an assistant professor of KFSCIS department of Florida International University. She studied her Ph.D. in Computer Science and Engineering at the University of California, Merced. [...]

0

Ning Xie

Dr. Xie is an Associate Professor in Computer Science at Florida International University. His research interests are in many aspects of algorithmic and complexity theory, including property [...]

0

Xueqiang Wang

Dr. Wang’s main research interest involves identifying security vulnerabilities, measuring cybercriminal activities, discovering new attack surfaces, and designing security mitigations in [...]

page 1 of 3