Crea il mio profilo
Accesso pubblico
Visualizza tutto25 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ufuk TopcuThe University of Texas at AustinEmail verificata su utexas.edu
- Herbert TannerUniversity of DelawareEmail verificata su udel.edu
- Abhishek Ninad KulkarniUniversity of Texas at AustinEmail verificata su ufl.edu
- Jeffrey HeinzStony Brook UniversityEmail verificata su stonybrook.edu
- Cagdas OnalDean’s Professor and Arseneault Faculty Fellow of Robotics Engineering, WPIEmail verificata su wpi.edu
- Charles KamhouaDEVCOM Army Research Laboratory, Network Security BranchEmail verificata su army.mil
- Xuan LiuPhD student of Robotics Engineering, Worcester Polytechnic InstituteEmail verificata su wpi.edu
- Nandi LesliePrincipal Technical Fellow, RTXEmail verificata su rtx.com
- Shuo HanAssistant Professor, University of Illinois at ChicagoEmail verificata su uic.edu
- Jane ChandleeHaverford CollegeEmail verificata su haverford.edu
- Lening LiSenior Software Engineer @ SymboticEmail verificata su symbotic.com
- Ma HaoxiangPhD student at Electrical Engineering, University of FloridaEmail verificata su ufl.edu
- Yanhua LiAssociate Professor at Worcester Polytechnic InstituteEmail verificata su wpi.edu
- Ming LuoFlaherty Assistant Professor, Washington State UniversityEmail verificata su wsu.edu
- Konstantinos KarydisUniversity of California, RiversideEmail verificata su ece.ucr.edu
- Rayna DimitrovaCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Chaouki AbdallahExecutive Vice President for ResearchEmail verificata su gatech.edu
- George PappasUPS Foundation Professor, Electrical and Systems Engineering, University of PennsylvaniaEmail verificata su seas.upenn.edu
- Nikolay A. AtanasovAssistant Professor, University of California San DiegoEmail verificata su ucsd.edu
- Shridhar ShahUniversity of DelawareEmail verificata su udel.edu