Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Brian M SadlerThe University of Texas at AustinVerified email at ieee.org
Richard J. KozickBucknell UniversityVerified email at bucknell.edu
Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Dilli Prasad SharmaUniversity of TorontoVerified email at utoronto.ca
Ram RamanathanChief Scientist, goTenna IncVerified email at gotenna.com
Fikadu DagefuUS Army Research LaboratoryVerified email at mail.mil
Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
Qisheng ZhangComputer Science Department, Virginia TechVerified email at vt.edu
Zelin WanDepartment of Computer Science, Virginia TechVerified email at vt.edu
Hamid KrimProfessor of ECE, Director of VISSTA Laboratory, North Carolina State UniversityVerified email at ncsu.edu
Minjune KimResearch Engineer@CSIRO's Data61 | Ex Samsung ElectronicsVerified email at csiro.au
Siddharth PalRaytheon BBN TechnologiesVerified email at rtx.com
Yash MahajanOracleVerified email at vt.edu
Michael BrodskyU.S. Army Research LaboratoryVerified email at army.mil
Júlio MendonçaPostdoctoral researcher, CritiX, University of LuxembourgVerified email at uni.lu
Jargalsaikhan NarantuyaKakaoenterpriseVerified email at kakaoenterprise.com