Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Wei XI (惠维)
Xi'an Jiaotong University
Verified email at xjtu.edu.cn
Cited by 3811
Internet of Things
Wireless Networks
Artificial Intelligence
Privacy & Security
Jose Such
Professor of Computer Science, King's College London & VRAIN-UPV
Verified email at kcl.ac.uk
Cited by 3453
Privacy & Security
Artificial Intelligence
Human-Computer Interaction
Hossein Pishro-Nik
University of Massachusetts Amherst
Verified email at ecs.umass.edu
Cited by 3026
Coding & Information Theory
Privacy & Security
Wireless & Vehicular Ad Hoc Networks
Probability & Statistics
Algorithms and
Suranga Seneviratne
University of Sydney
Verified email at sydney.edu.au
Cited by 2832
Privacy & Security
Internet Measurements
Machine Learning
Computer Networks
Nithya Sambasivan
Verified email at google.com
Cited by 2643
Human Computer Interaction
Information and Communication …
Privacy & Security
Artificial Intellige
Kanchana Thilakarathna
University of Sydney
Verified email at sydney.edu.au
Cited by 2319
Mobile Systems
Privacy & Security
Internet of Things
Wearable Computing
Julian Schütte
Google
Verified email at google.com
Cited by 1745
Privacy & Security
Program Analysis
Ramakrishna "Ramki" Thurimella
Verified email at du.edu
Cited by 1645
Algorithms
Distributed Computing
Privacy & Security
Eugenia Politou
University of Piraeus, Department of Informatics
Verified email at unipi.gr
Cited by 1548
Privacy & Security
Blockchain
IPFS
Human Computer Interaction
Mobile Affective Computing
Jianwei Qian
PhD, Engineer@Google
Verified email at hawk.iit.edu
Cited by 1204
Privacy & Security
Infrastructure
Machine Learning
Mobile Computing
1 - 10
Privacy
Terms
Help
About Scholar
Search help