Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ismail GuvencNorth Carolina State UniversityVerified email at ncsu.edu
- Mihail SichitiuNC State UniversityVerified email at ncsu.edu
- Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityVerified email at ncsu.edu
- Ozgur OzdemirAssociate Research ProfessorVerified email at ncsu.edu
- Chethan Kumar AnjinappaEricsson ResearchVerified email at ericsson.com
- Simran SinghNorth Carolina State UniversityVerified email at ncsu.edu
- Arupjyoti BhuyanDirector, INL Wireless Security InstituteVerified email at inl.gov
- Brian A. FloydAlton & Mildred Lancaster Professor in Electrical & Computer Engineering, NC State UniversityVerified email at ncsu.edu
- Rudra DuttaProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
- Moin ChowdhuryAI Researcher @ Ericsson ResearchVerified email at ericsson.com
- Vuk MarojevicAssociate Professor, Mississippi StateVerified email at msstate.edu
- Prashnatita PalAsst. Prof of ECE ,St Thomas College Of Engineering & TechnologyVerified email at stcet.ac.in