Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mitchell A ThorntonSouthern Methodist University, Darwin Deason Institute for Cyber SecurityVerified email at ieee.org
- Jennifer DworakSouthern Methodist UniversityVerified email at lyle.smu.edu
- Kundan NepalUniversity of St. Thomas, Saint Paul, MNVerified email at stthomas.edu
- R. Iris BaharSchool of Engineering, Dept. of Computer Science, Brown UniversityVerified email at brown.edu
- Suku NairUniversity Distinguished Professor of Computer Science and Engineering, SMU, DallasVerified email at smu.edu
- Ping GuiSouthern Methodist UniversityVerified email at smu.edu
- Shinobu NagayamaHiroshima City UniversityVerified email at hiroshima-cu.ac.jp
- Debarshi ChatterjeeNvidia CorporationVerified email at nvidia.com
- Yi SunSouthern Methodist UniversityVerified email at smu.edu
- Soha AlhelalySaudi Electronic UniversityVerified email at seu.edu.sa
- Tsutomu SasaoVisiting Professor, Meiji UniversityVerified email at cs.meiji.ac.jp
- Poramate OngsakornSouthern Methodist UniversityVerified email at lyle.smu.edu
- Kaitlin N. SmithNorthwestern UniversityVerified email at northwestern.edu
- Igor L. MarkovSynopsysVerified email at synopsys.com
- Phillip LaplanteNIST/Penn StateVerified email at psu.edu