Get my own profile
Public access
View all11 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Ismail GuvencNorth Carolina State UniversityVerified email at ncsu.edu
- Yavuz YapiciQualcomm ResearchVerified email at qti.qualcomm.com
- Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityVerified email at ncsu.edu
- Arupjyoti BhuyanDirector, INL Wireless Security InstituteVerified email at inl.gov
- Jorge Iscar VergaraMaster's student at Florida International UniversityVerified email at fiu.edu
- Sener DikmeseSystem Manager in Ericsson ABVerified email at tut.fi
- Ahmed S. IbrahimAssociate Professor, Florida International UniversityVerified email at fiu.edu
- Monisha GhoshUniversity Of Notre DameVerified email at nd.edu
- Imtiaz ParvezUtah Valley UniversityVerified email at uvu.edu
- Arif I. SarwatEminent Scholar Chaired Professor, Electrical & Computer Engineering Florida InternationalVerified email at fiu.edu
- Arvind MerwadayIntel Labs, Intel CorporationVerified email at intel.com
- Walid SaadProfessor, Electrical and Computer Engineering, Virginia TechVerified email at vt.edu
- Murat YukselProfessor, University of Central FloridaVerified email at ucf.edu
- Ozgun Y. BursaliogluDocomo InnovationsVerified email at docomoinnovations.com
- Chenwei WangPrincipal Research Engineer, DOCOMO Innovations Inc., Palo Alto, CaliforniaVerified email at uci.edu
- Giuseppe CaireProfessor, Technical University of Berlin, Germany, and Professor of Electrical Engineering (onVerified email at tu-berlin.de
- Zheda LiAmazon Lab126Verified email at usc.edu
- Leonardo BabunSenior Cybersecurity Researcher at the Johns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu