Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
- Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
- Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
- Brian M SadlerThe University of Texas at AustinVerified email at ieee.org
- Richard J. KozickBucknell UniversityVerified email at bucknell.edu
- Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
- Dilli SharmaUniversity of TorontoVerified email at utoronto.ca
- Fikadu DagefuUS Army Research LaboratoryVerified email at mail.mil
- Ram RamanathanChief Scientist, goTenna IncVerified email at gotenna.com
- Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
- Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
- Qisheng ZhangComputer Science Department, Virginia TechVerified email at vt.edu
- Zelin WanDepartment of Computer Science, Virginia TechVerified email at vt.edu
- Hamid KrimProfessor of ECE, Director of VISSTA Laboratory, North Carolina State UniversityVerified email at ncsu.edu
- Minjune KimCSIRO's Data61 | Ph.D. | Ex Samsung ElectronicsVerified email at csiro.au
- Siddharth PalRaytheon BBN TechnologiesVerified email at rtx.com
- Yash MahajanOracleVerified email at vt.edu
- Michael BrodskyU.S. Army Research LaboratoryVerified email at army.mil
- Júlio MendonçaPostdoctoral researcher, CritiX, University of LuxembourgVerified email at uni.lu
- Jargalsaikhan NarantuyaKakaoenterpriseVerified email at kakaoenterprise.com