Get my own profile
Public access
View all8 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Paulo TabuadaVijay K. Dhir Professor of Engineering, UCLAVerified email at ee.ucla.edu
Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityVerified email at tu-dortmund.de
Matthew PhilippePostdoctoral Fellow - B.A.E.F. - UCLAVerified email at uclouvain.be
Zexiang LiuUniversity of MichiganVerified email at umich.edu
Necmiye OzayEECS, University of MichiganVerified email at umich.edu
j.c. engwerdaVerified email at uvt.nl
Bas van AarleK.U. LeuvenVerified email at maastrichtuniversity.nl
Jonathan BuntonPhD, University of California, Los AngelesVerified email at ucla.edu
George Papavassilopoulosprofessor ntuaVerified email at netmode.ntua.gr
Christina FragouliUCLAVerified email at ucla.edu
Gunjan VermaVerified email at army.mil
Luigi PannocchiScuola Superiore Sant'AnnaVerified email at santannapisa.it
Anjaly ParayilSenior Research Scientist, M365 Research, MicrosoftVerified email at microsoft.com
Jemin GeorgeU.S. Army Research LaboratoryVerified email at mail.mil
Bhaskar KrishnamachariProfessor of Electrical and Computer Engineering, and Computer Science, USCVerified email at usc.edu
Jared ColemanAssistant Professor of Computer Science, Loyola Marymount UniversityVerified email at lmu.edu
Mine Gokce DoganPhD student at University of California, Los Angeles (UCLA)Verified email at g.ucla.edu
Prashant ShenoyDistinguished Professor, College of Information and Computer Sciences, University of MassachusettsVerified email at cs.umass.edu
Abel SouzaUniversity of Massachusetts AmherstVerified email at asouza.io