Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mitchell A ThorntonSouthern Methodist University, Darwin Deason Institute for Cyber SecurityVerified email at ieee.org
Jennifer DworakSouthern Methodist UniversityVerified email at lyle.smu.edu
Kundan NepalUniversity of St. Thomas, Saint Paul, MNVerified email at stthomas.edu
R. Iris BaharSchool of Engineering, Dept. of Computer Science, Brown UniversityVerified email at brown.edu
Suku NairUniversity Distinguished Professor of Computer Science and Engineering, SMU, DallasVerified email at smu.edu
Shinobu NagayamaHiroshima City UniversityVerified email at hiroshima-cu.ac.jp
Ping GuiSouthern Methodist UniversityVerified email at smu.edu
Debarshi ChatterjeeNvidia CorporationVerified email at nvidia.com
Yi SunSouthern Methodist UniversityVerified email at smu.edu
Soha AlhelalySaudi Electronic UniversityVerified email at seu.edu.sa
Tsutomu SasaoVisiting Professor, Meiji UniversityVerified email at cs.meiji.ac.jp
Poramate OngsakornSouthern Methodist UniversityVerified email at lyle.smu.edu
Kaitlin N. SmithNorthwestern UniversityVerified email at northwestern.edu
Igor L. MarkovSynopsysVerified email at synopsys.com
Phillip LaplanteNIST/Penn StateVerified email at psu.edu