Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mohamed Kashef (Mohamed Hany)National Institute of Standards and TechnologyVerified email at nist.gov
- Yongkang LiuFDAVerified email at uwaterloo.ca
- Henrik SandbergProfessor of Decision and Control Systems, KTH Royal Institute of TechnologyVerified email at kth.se
- Justin RuthsAssistant Professor of Mechanical Engineering and Systems Engineering, UT DallasVerified email at utdallas.edu
- Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Mustafa Amir FaisalProcter and GambleVerified email at pg.com
- Jairo GiraldoResearch Assistant Professor, University of UtahVerified email at utah.edu
- Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
- Junia ValenteToyota Tsusho Systems US, Inc.Verified email at toyota.com
- Jeanne QuimbyNational Institute of Standard and TechnologyVerified email at nist.gov
- Sebti Foufou, PhDProf. of Computer Science, University of Sharjah, UAEVerified email at sharjah.ac.ae
- Nader MoayeriNational Institute of Standards and TechnologyVerified email at nist.gov
- Zhibo PangABB Corporate Research, and KTH Royal Institute of Technology, SwedenVerified email at kth.se
- Shuvra S. BhattacharyyaProfessor of Electrical and Computer Engineering, University of MarylandVerified email at umd.edu
- Michele LuvisottoABB Corporate Research, SwedenVerified email at se.abb.com
- Xiaolin JiangEricsson ResearchVerified email at ericsson.com
- Carlo FischioneProfessor, KTH, EECS, Network and Systems EngineeringVerified email at kth.se
- Sajal BhatiaSacred Heart UniversityVerified email at sacredheart.edu
- Goncalo MartinsUniversity of Denver (USA)Verified email at du.edu
- Xenofon KoutsoukosVanderbilt UniversityVerified email at vanderbilt.edu