Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
- Bilgiday YuceSecurity Researcher at IntelVerified email at vt.edu
- Leyla NazhandaliAssociate Professor, Bradley Department of Electrical and Computer Engineering, Virginia TechVerified email at vt.edu
- Aydin AysuNorth Carolina State UniversityVerified email at vt.edu
- Mostafa TahaAssistant Professor in the Systems and Computer Engineering Dept. of Carleton UniversityVerified email at sce.carleton.ca
- Mahdi FazeliAssociate Professor, School of Information Technology, Halmstad UniversityVerified email at hh.se
- Zane FranklinResearch Faculty, Georgia Tech Research InstituteVerified email at gatech.edu
- zhi chenPhD student of Computer Science, University of California, IrvineVerified email at uci.edu
- Alex NicolauProfessor of Computer Science, University of CaliforniaVerified email at ics.uci.edu
- Rosario Cammarota ("Ro")Intel LabsVerified email at ieee.org
- Dinesh GantaIntel CorporationVerified email at vt.edu
- Malek Ben SalemAccentureVerified email at accenture.com
- Hossein Izadi RadElectrical Engineering and Information Systems Department, The University of TokyoVerified email at cad.t.u-tokyo.ac.jp
- Hamed FarbehAmirkabir University of TechnologyVerified email at aut.ac.ir
- Hossein AsadiProfessor, Department of Computer Engineering, Sharif University of TechnologyVerified email at sharif.edu
- Nooshin MirzadehEPFLVerified email at epfl.ch
- Adel AhmadyanGoogleVerified email at google.com
- Marjan GhodratiVerified email at vt.edu