Get my own profile
Public access
View all7 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Christos PapadopoulosUniversity of MemphisVerified email at memphis.edu
- Jelena MirkovicUniversity of Southern CaliforniaVerified email at isi.edu
- John HeidemannUniversity of Southern California / Information Sciences InstituteVerified email at isi.edu
- Sonia FahmyProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Ramesh GovindanProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
- Anuradha AnnaswamySenior Research Scientist, MITVerified email at mit.edu
- Aranya ChakraborttyProfessor of Electrical Engineering, Associate Department Head for Research, NC State UniversityVerified email at ncsu.edu
- Saurabh AminMassachusetts Institute of TechnologyVerified email at mit.edu
- Paul C. WoodVerified email at meta.com
- Arun ViswanathanCyber Security Researcher at Jet Propulsion LaboratoryVerified email at jpl.nasa.gov
- Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & NSF CHORUS; PurdueVerified email at purdue.edu
- Seyed Mehran DibajiMITVerified email at mit.edu
- Zahaib AkhtarAmazon Prime Video / NCSUVerified email at amazon.com
- Ethan Katz-BassettAssociate Professor, Columbia UniversityVerified email at columbia.edu
- Tim YardleyPrincipal Research Scientist / Associate DirectorVerified email at illinois.edu
- William H SandersCarnegie Mellon UniversityVerified email at cmu.edu