Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Franz FranchettiCarnegie Mellon UniversityEmail verificata su ece.cmu.edu
- Brandon ReagenAssistant Professor, New York UniversityEmail verificata su nyu.edu
- Negar NedaPh.D. Candidate, New York UniversityEmail verificata su nyu.edu
- Ben ReynwarResearch Programmer, Information Sciences InstituteEmail verificata su reynwar.net
- Andrew G. SchmidtUniversity of Southern California Information Sciences InstituteEmail verificata su isi.edu
- David Bruce CousinsDuality TechnologiesEmail verificata su dualitytech.com
- Ahmad Al BadawiSenior Scientist in Applied CryptographyEmail verificata su u.nus.edu
- Yuriy PolyakovPrincipal Scientist, Duality TechnologiesEmail verificata su dualitytech.com
- Jeremy JohnsonProfessor of Computer Science, Drexel UniversityEmail verificata su cs.drexel.edu
- Deepraj SoniNew York UniversityEmail verificata su nyu.edu
- Michail (Mihalis) ManiatakosAssociate Professor, New York University Abu DhabiEmail verificata su nyu.edu
- Homer GamilCenter for Cyber Security, New York University Abu DhabiEmail verificata su nyu.edu
- Matthew FrenchResearch Director, Information Sciences InstituteEmail verificata su isi.edu
- Massoud PedramCharles Lee Powell Professor of Electrical Engineering & Computer Science, Univ of SouthernEmail verificata su usc.edu
- Viktor K. PrasannaUniversity of Southern CaliforniaEmail verificata su usc.edu
- Ajitesh SrivastavaResearch Assistant Professor, University of Southern CaliforniaEmail verificata su usc.edu
- Ajey JacobInformation Sciences Institute, University of Southern CaliforniaEmail verificata su isi.edu
- Akhilesh JaiswalAssistant Professor, University of Wisconsin-MadisonEmail verificata su wisc.edu
- Mohammed Nabeel Thari MoopanResearch Engineer, DFX lab, NYUADEmail verificata su nyu.edu
- Austin EbelColumbia UniversityEmail verificata su columbia.edu