Get my own profile
Public access
View all86 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Kemal AkkayaProfessor of Computer Science, Florida International UniversityVerified email at fiu.edu
Hidayet AksuGoogleVerified email at google.com
Leonardo BabunSenior Cybersecurity Researcher at The Johns Hopkins University Applied Physics LabVerified email at jhuapl.edu
Abbas AcarHarbor LabsVerified email at harborlabs.com
Amit Kumar SikderAssistant Professor, Iowa State UniversityVerified email at iastate.edu
Raheem BeyahDean and Southern Company Chair, Georgia Tech College of EngineeringVerified email at ece.gatech.edu
Ahmet ArıºSecurity Engineer at BeyondTrustVerified email at beyondtrust.com
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
John A. CopelandProfessor Emeritus, Ga. Tech, ECEVerified email at ece.gatech.edu
Z. Berkay CelikAssistant Professor of Computer Science, Purdue UniversityVerified email at purdue.edu
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
Enes ErdinUniversity of Central ArkansasVerified email at uca.edu
Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
Nico SaputroParahyangan Catholic UniversityVerified email at unpar.ac.id
Harun OzResearch Scientist, MetaVerified email at meta.com
Luis Puche RondonPhD Student, Florida International UniversityVerified email at fiu.edu
Ismail GuvencNorth Carolina State UniversityVerified email at ncsu.edu
Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
Abdullah AYDEGERElectrical Engineering and Computer Science, Florida Institute of TechnologyVerified email at fit.edu
Hamid MenouarSenior R&D Expert and Product Manager, Qatar Mobility Innovations Center, Qatar UniversityVerified email at qu.edu.qa