Get my own profile
Public access
View all59 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Milad NasrGoogle DeepMindVerified email at srxzr.com
- Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
- Hossein Pishro-NikUniversity of Massachusetts AmherstVerified email at ecs.umass.edu
- Negar KiyavashÉcole polytechnique fédérale de Lausanne (EPFL)Verified email at epfl.ch
- Don TowsleyUniversity of MassachusettsVerified email at cs.umass.edu
- Prof. Wojciech MazurczykWarsaw University of Technology (Poland) & FernUniversitaet in Hagen (Germany)Verified email at pw.edu.pl
- Steffen WendzelUniversity of UlmVerified email at uni-ulm.de
- Krzysztof SzczypiorskiWarsaw University of Technology, PolandVerified email at pw.edu.pl
- Ramin Soltani, PhDUniversity of MassachusettsVerified email at umass.edu
- Sebastian ZanderMurdoch UniversityVerified email at murdoch.edu.au
- Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
- Saman ZonouzAssociate Professor, Georgia TechVerified email at gatech.edu
- Giang NguyenComputer Science Graduate Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Robin BerthierUniversity of IllinoisVerified email at illinois.edu
- Shishir NagarajaProfessor of Cybersecurity, University of NewcastleVerified email at newcastle.ac.uk
- Andrew C. SingerDean, College of Engineering and Applied Sciences, Stony Brook UniversityVerified email at stonybrook.edu
- Thomas J. RiedlUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Zarrin MontazeriMaster's Degree, University of Massachusetts AmherstVerified email at umass.edu
- Brian Neil LevineDistinguished Professor, Manning College of Information and Computer Sciences, UMass AmherstVerified email at cs.umass.edu
- Wenxuan ZhouUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu