Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Paulo TabuadaVijay K. Dhir Professor of Engineering, UCLAVerified email at ee.ucla.edu
- Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityVerified email at tu-dortmund.de
- Matthew PhilippePostdoctoral Fellow - B.A.E.F. - UCLAVerified email at uclouvain.be
- Zexiang LiuUniversity of MichiganVerified email at umich.edu
- Necmiye OzayEECS, University of MichiganVerified email at umich.edu
- j.c. engwerdaVerified email at uvt.nl
- Bas van AarleK.U. LeuvenVerified email at maastrichtuniversity.nl
- Jonathan BuntonPhD Student, University of California, Los AngelesVerified email at ucla.edu
- George Papavassilopoulosprofessor ntuaVerified email at netmode.ntua.gr
- Christina FragouliUCLAVerified email at ucla.edu
- Gunjan VermaVerified email at army.mil
- Luigi PannocchiScuola Superiore Sant'AnnaVerified email at santannapisa.it
- Anjaly ParayilResearcher, MicrosoftVerified email at microsoft.com
- Jemin GeorgeU.S. Army Research LaboratoryVerified email at mail.mil
- Bhaskar KrishnamachariProfessor of Electrical and Computer Engineering, and Computer Science, USCVerified email at usc.edu
- Jared ColemanAssistant Professor of Computer Science, Loyola Marymount UniversityVerified email at lmu.edu
- Mine Gokce DoganPhD student at University of California, Los Angeles (UCLA)Verified email at g.ucla.edu
- Prashant ShenoyDistinguished Professor, College of Information and Computer Sciences, University of MassachusettsVerified email at cs.umass.edu
- Abel SouzaUniversity of Massachusetts AmherstVerified email at asouza.io