Get my own profile
Public access
View all47 articles
14 articles
available
not available
Based on funding mandates
Co-authors
- Chita R. DasPenn State UniversityVerified email at cse.psu.edu
- Youngmi JinKAIST Graduate School of Future StrategyVerified email at kaist.ac.kr
- Jean WalrandProfessor of EECSVerified email at eecs.berkeley.edu
- Gustavo de VecianaProfessor of Electrical and Computer Engineering, U.T. AustinVerified email at ece.utexas.edu
- Christopher GriffinThe Pennsylvania State UniversityVerified email at psu.edu
- Stéphane CaronResearch Scientist, Inria – École Normale Supérieure, ParisVerified email at inria.fr
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Anna ScaglioneProfessor of Electrical and Computer Engineering, Cornell UniversityVerified email at cornell.edu
- Eitan AltmanSenior Researchers at INRIA, Sophia-Antipolis, FranceVerified email at inria.fr
- Serge FdidaProfessor of Computer Science, Sorbonne University & CNRSVerified email at sorbonne-universite.fr
- Costas CourcoubetisProfessor in SDS, CUHK ShenzhenVerified email at cuhk.edu.cn
- Vern PaxsonProfessor, EECS, University of California, BerkeleyVerified email at berkeley.edu
Follow
George Kesidis
Professor of Computer Science and Engineering, Pennsylvania State University; Professor of Electrical Engineering, Pennsylvania
Verified email at engr.psu.edu - Homepage