Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Lydia Y. ChenUniversity of Neuchatel/ TU DelftVerified email at ieee.org
- Robert BirkeUniversità degli Studi Di TorinoVerified email at unito.it
- Sonia Ben MokhtarLIRIS CNRSVerified email at cnrs.fr
- Sophie CerfINRIAVerified email at inria.fr
- Stefanie RoosProfessor, University of Kaiserslautern-LandauVerified email at cs.rptu.de
- Maolong LvDelft Center for Systems and Control, Delft University of TechnologyVerified email at tudelft.nl
- Rui HanAssociate Professor, Beijing Institute of TechnologyVerified email at bit.edu.cn
- Nicolas MarchandCNRS-GIPSA-lab GrenobleVerified email at gipsa-lab.fr
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
- Han WuAssistant Professor (Lecturer) in Cyber Security, School of ECS, University of SouthamptonVerified email at soton.ac.uk
- Joel MeffordUCLAVerified email at g.ucla.edu
- Ioan LandauEmeritus Research Director, GIPSA-LABVerified email at gipsa-lab.grenoble-inp.fr
- Enkelejda KasneciProfessor at the Technical University of MunichVerified email at tum.de
- Yao RongPhD Student, Technical University of MunichVerified email at tum.de
- Sara BouchenakProfessor in Computer Science, INSA LyonVerified email at insa-lyon.fr