Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mohamed Kashef (Mohamed Hany)National Institute of Standards and TechnologyVerified email at nist.gov
Yongkang LiuFDAVerified email at uwaterloo.ca
Henrik SandbergProfessor of Decision and Control Systems, KTH Royal Institute of TechnologyVerified email at kth.se
Justin RuthsAssistant Professor of Mechanical Engineering and Systems Engineering, UT DallasVerified email at utdallas.edu
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Mustafa Amir FaisalProcter and GambleVerified email at pg.com
Jairo GiraldoResearch Assistant Professor, University of UtahVerified email at utah.edu
Alvaro A. CardenasProfessor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Junia ValenteToyota Tsusho Systems US, Inc.Verified email at toyota.com
Jeanne QuimbyNational Institute of Standard and TechnologyVerified email at nist.gov
Keith StoufferNational Institute of Standards and TechnologyVerified email at nist.gov
Sebti Foufou, PhDProf. of Computer Science, University of Sharjah, UAEVerified email at sharjah.ac.ae
Nader MoayeriNational Institute of Standards and TechnologyVerified email at nist.gov
Jing GengNational Institute of Standards and Technology / University of MarylandVerified email at nist.gov
Dave CavalcantiIntel CorporatinVerified email at intel.com
Zhibo PangABB Corporate Research, and KTH Royal Institute of Technology, SwedenVerified email at kth.se
Shuvra S. BhattacharyyaProfessor of Electrical and Computer Engineering, University of MarylandVerified email at umd.edu
Michele LuvisottoABB Corporate Research, SwedenVerified email at se.abb.com
Xiaolin JiangEricsson ResearchVerified email at ericsson.com
Carlo FischioneProfessor, KTH, EECS, Network and Systems EngineeringVerified email at kth.se