Get my own profile
Public access
View all8 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Christos PapadopoulosUniversity of MemphisVerified email at memphis.edu
Jelena MirkovicUniversity of Southern CaliforniaVerified email at isi.edu
John HeidemannUniversity of Southern California / Information Sciences InstituteVerified email at isi.edu
Sonia FahmyProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Ramesh GovindanProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
Anuradha AnnaswamySenior Research Scientist, MITVerified email at mit.edu
Aranya ChakraborttyProfessor of Electrical EngineeringVerified email at ncsu.edu
Saurabh AminMassachusetts Institute of TechnologyVerified email at mit.edu
Paul C. WoodVerified email at meta.com
Arun ViswanathanCyber Security Researcher at Jet Propulsion LaboratoryVerified email at usc.edu
Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue UniversityVerified email at purdue.edu
Seyed Mehran DibajiMITVerified email at mit.edu
Zahaib AkhtarApplied Scientist at Amazon Prime VideoVerified email at amazon.com
Ethan Katz-BassettAssociate Professor, Columbia UniversityVerified email at columbia.edu
Tim YardleyPrincipal Research Scientist / Associate DirectorVerified email at illinois.edu
William H SandersCarnegie Mellon UniversityVerified email at cmu.edu