Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Srinivas DevadasEdwin Sibley Webster Professor of Electrical Engineering and Computer Science, MITEmail verificata su mit.edu
- Kartik NayakDuke UniversityEmail verificata su cs.duke.edu
- Christopher W. FletcherUniversity of California, BerkeleyEmail verificata su berkeley.edu
- Ittai AbrahamIntelEmail verificata su cs.huji.ac.il
- Elaine ShiCarnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Zhuolun XiangAptosEmail verificata su aptoslabs.com
- Xiangyao YuUniversity of Wisconsin - MadisonEmail verificata su cs.wisc.edu
- Albert KwonMITEmail verificata su mit.edu
- Dahlia malkhiUniversity of California, Santa BarbaraEmail verificata su ucsb.edu
- Sourav DasPhD Student, UIUCEmail verificata su illinois.edu
- Yu Wang (汪玉)Department of Electronic Engineering, Tsinghua University, ChinaEmail verificata su mail.tsinghua.edu.cn
- Hao ChenFacebookEmail verificata su fb.com
- Dongning Guo (郭东宁)Professor of Electrical and Computer Engineering, Northwestern UniversityEmail verificata su northwestern.edu
- Peter GažiIOG ResearchEmail verificata su iohk.io
- Alexander RussellUniversity of ConnecticutEmail verificata su cse.uconn.edu
- Jeremiah BlockiPurdue UniversityEmail verificata su purdue.edu
- Xiaohai DaiHuazhong University of Science and TechnologyEmail verificata su hust.edu.cn
- Atsuki MomoseAcompany
- Marten van DijkComputer Security, CWI, Amsterdam; Vrije Universiteit van Amsterdam; ECE Department UConn
Segui
Ling Ren
Assistant Professor, University of Illinois at Urbana-Champaign
Email verificata su illinois.edu - Home page