Get my own profile
Public access
View all63 articles
1 article
available
not available
Based on funding mandates
Co-authors
Milad NasrGoogle DeepMindVerified email at srxzr.com
Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
Hossein Pishro-NikUniversity of Massachusetts AmherstVerified email at ecs.umass.edu
Don TowsleyUniversity of MassachusettsVerified email at cs.umass.edu
Negar KiyavashÉcole polytechnique fédérale de Lausanne (EPFL)Verified email at epfl.ch
Prof. Wojciech MazurczykWarsaw University of Technology (Poland) & FernUniversitaet in Hagen (Germany)Verified email at pw.edu.pl
Steffen WendzelUniversity of UlmVerified email at uni-ulm.de
Krzysztof SzczypiorskiWarsaw University of Technology, PolandVerified email at pw.edu.pl
Ramin Soltani, PhDUniversity of MassachusettsVerified email at umass.edu
Sebastian ZanderMurdoch UniversityVerified email at murdoch.edu.au
Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Saman ZonouzAssociate Professor, Georgia TechVerified email at gatech.edu
Giang NguyenComputer Science Graduate Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Robin BerthierUniversity of IllinoisVerified email at illinois.edu
Shishir NagarajaProfessor of Cybersecurity, University of NewcastleVerified email at newcastle.ac.uk
Andrew C. SingerDean, College of Engineering and Applied Sciences, Stony Brook UniversityVerified email at stonybrook.edu
Thomas J. RiedlUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Zarrin MontazeriMaster's Degree, University of Massachusetts AmherstVerified email at umass.edu
Brian Neil LevineDistinguished Professor, Manning College of Information and Computer Sciences, UMass AmherstVerified email at cs.umass.edu
Wenxuan ZhouUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu