Get my own profile
Public access
View all43 articles
1 article
available
not available
Based on funding mandates
Co-authors
Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
Milad NasrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Hossein Pishro-NikUniversity of Massachusetts AmherstVerified email at ecs.umass.edu
Negar KiyavashÉcole polytechnique fédérale de Lausanne (EPFL)Verified email at epfl.ch
Steffen WendzelHochschule Worms/FernUniversität in Hagen, GermanyVerified email at hs-worms.de
Prof. Wojciech MazurczykWarsaw University of Technology (Poland) & FernUniversitaet in Hagen (Germany)Verified email at pw.edu.pl
Don TowsleyUniversity of MassachusettsVerified email at cs.umass.edu
Ramin Soltani, PhDUniversity of MassachusettsVerified email at umass.edu
Sebastian ZanderMurdoch UniversityVerified email at murdoch.edu.au
Krzysztof SzczypiorskiWarsaw University of Technology, Poland | Cryptomage S.A., PolandVerified email at pw.edu.pl
Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Giang NguyenComputer Science Graduate Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Saman ZonouzAssociate Professor, Georgia TechVerified email at gatech.edu
Robin BerthierUniversity of IllinoisVerified email at illinois.edu
Shishir NagarajaProfessor of Cybersecurity, University of NewcastleVerified email at newcastle.ac.uk
Andrew SingerProfessor of Electrical and Computer Engineering, University of Illinois at Urbana ChampaignVerified email at uiuc.edu
Thomas J. RiedlUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Zarrin MontazeriMaster's Degree, University of Massachusetts AmherstVerified email at umass.edu
Brian Neil LevineProfessor, College of Information and Computer Sciences, UMass AmherstVerified email at cs.umass.edu
Xun GongUniversity of IllinoisVerified email at illinois.edu