Get my own profile
Public access
View all47 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
Milad NasrGoogle DeepMindVerified email at srxzr.com
Hossein Pishro-NikUniversity of Massachusetts AmherstVerified email at ecs.umass.edu
Negar KiyavashÉcole polytechnique fédérale de Lausanne (EPFL)Verified email at epfl.ch
Don TowsleyUniversity of MassachusettsVerified email at cs.umass.edu
Steffen WendzelHochschule Worms/FernUniversität in Hagen, GermanyVerified email at hs-worms.de
Prof. Wojciech MazurczykWarsaw University of Technology (Poland) & FernUniversitaet in Hagen (Germany)Verified email at pw.edu.pl
Ramin Soltani, PhDUniversity of MassachusettsVerified email at umass.edu
Sebastian ZanderMurdoch UniversityVerified email at murdoch.edu.au
Krzysztof SzczypiorskiWarsaw University of Technology, Poland | Cryptomage S.A.Verified email at pw.edu.pl
Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Saman ZonouzAssociate Professor, Georgia TechVerified email at gatech.edu
Giang NguyenComputer Science Graduate Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Robin BerthierUniversity of IllinoisVerified email at illinois.edu
Shishir NagarajaProfessor of Cybersecurity, University of NewcastleVerified email at newcastle.ac.uk
Andrew C. SingerDean, College of Engineering and Applied Sciences, Stony Brook UniversityVerified email at stonybrook.edu
Thomas J. RiedlUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Zarrin MontazeriMaster's Degree, University of Massachusetts AmherstVerified email at umass.edu
Brian Neil LevineProfessor, College of Information and Computer Sciences, UMass AmherstVerified email at cs.umass.edu
Wenxuan ZhouUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu