Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Paulo TabuadaVijay K. Dhir Professor of Engineering, UCLAEmail verificata su ee.ucla.edu
- Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityEmail verificata su tu-dortmund.de
- Matthew PhilippePostdoctoral Fellow - B.A.E.F. - UCLAEmail verificata su uclouvain.be
- Zexiang LiuUniversity of MichiganEmail verificata su umich.edu
- Necmiye OzayEECS, University of MichiganEmail verificata su umich.edu
- Bas van AarleK.U. LeuvenEmail verificata su maastrichtuniversity.nl
- Jonathan BuntonPhD, University of California, Los AngelesEmail verificata su ucla.edu
- Christina FragouliUCLAEmail verificata su ucla.edu
- Gunjan VermaEmail verificata su army.mil
- George Papavassilopoulosprofessor ntuaEmail verificata su netmode.ntua.gr
- Luigi PannocchiScuola Superiore Sant'AnnaEmail verificata su santannapisa.it
- Anjaly ParayilSenior Research Scientist, M365 Research, MicrosoftEmail verificata su microsoft.com
- Jemin GeorgeU.S. Army Research LaboratoryEmail verificata su mail.mil
- Bhaskar KrishnamachariProfessor of Electrical and Computer Engineering, and Computer Science, USCEmail verificata su usc.edu
- Jared ColemanAssistant Professor of Computer Science, Loyola Marymount UniversityEmail verificata su lmu.edu
- Mine Gokce DoganPhD student at University of California, Los Angeles (UCLA)Email verificata su g.ucla.edu
- Prashant ShenoyDistinguished Professor, College of Information and Computer Sciences, University of MassachusettsEmail verificata su cs.umass.edu
- Abel SouzaAssistant Professor at University of California Santa CruzEmail verificata su ucsc.edu