Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nektarios Georgios TsoutsosAssistant Professor, University of DelawareEmail verificata su udel.edu
- Charalambos KonstantinouAssistant Professor, KAUSTEmail verificata su kaust.edu.sa
- Esha SarkarAI Research Scientist at Intel CorporationEmail verificata su nyu.edu
- Anastasis (Tasos) KelirisRed Balloon SecurityEmail verificata su nyu.edu
- Ramesh Karri కర్రి రమేష్Professor of Electrical and Computer Engineering, New York UniversityEmail verificata su nyu.edu
- Yiorgos MakrisThe University of Texas at DallasEmail verificata su utdallas.edu
- Eduardo ChielleResearch Associate, New York University Abu DhabiEmail verificata su nyu.edu
- Homer GamilCenter for Cyber Security, New York University Abu DhabiEmail verificata su nyu.edu
- Xueyang WangAlibaba GroupEmail verificata su nyu.edu
- Oleg MazonkaNYUEmail verificata su nyu.edu
- Dimitrios TychalasIntel CorporationEmail verificata su intel.com
- Naghmeh KarimiAssociate Professor, Computer Science & Electrical Eng., University of Maryland Baltimore CountyEmail verificata su umbc.edu
- Nikhil Gupta, FASMNew York University, Tandon School of EngineeringEmail verificata su nyu.edu
- Saif Eddin JabariNew York University Abu DhabiEmail verificata su nyu.edu
- Maria K MichaelElectrical and Computer Engineering Department, KIOS Center of Excellence, University of CyprusEmail verificata su ucy.ac.cy
- Hadjer BenkraoudaPh.D. Student, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Prashant Hari Narayan RajputNew York UniversityEmail verificata su nyu.edu
- Lucas Vincenzo DaviUniversity of Duisburg-EssenEmail verificata su uni-due.de
- Ahmad-Reza SadeghiTechnische Universität DarmstadtEmail verificata su trust.tu-darmstadt.de
- Stephen McLaughlinSamsung Research AmericaEmail verificata su samsung.com