Get my own profile
Public access
View all87 articles
53 articles
available
not available
Based on funding mandates
Co-authors
Sachin ShettyOld Dominion UniversityVerified email at odu.edu
Deepak K. ToshAssociate ProfessorVerified email at utep.edu
Ahmed H. Anwar, (Ahmed Hemida)Research Scientist, DEVCOM ARLVerified email at knights.ucf.edu
Nandi LesliePrincipal Technical Fellow, RTXVerified email at rtx.com
David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
Xueping Susan LiangFlorida International UniversityVerified email at fiu.edu
Christopher KiekintveldUniversity of Texas at El PasoVerified email at utep.edu
Muhammad SaadX (formerly Twitter)Verified email at knights.ucf.edu
SHAMIK SENGUPTAExecutive Director, UNR Cybersecurity Center & Professor of Computer Science and Engineering Dept.Verified email at unr.edu
Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
DaeHun NyangEwha Womans UniversityVerified email at ewha.ac.kr
Danda B. RawatProfessor of ECE & CS, Howard UniversityVerified email at howard.edu
Jeffrey SpauldingAdjunct Professor, Canisius CollegeVerified email at canisius.edu
Zelin WanDepartment of Computer Science, Virginia TechVerified email at vt.edu
Gabriel DeugoueProfessor of Mathematics, University of DschangVerified email at univ-dschang.org
Sundararaja Sitharama IyengarProfessor of Computer Science, Florida International UniversityVerified email at cis.fiu.edu
Mainak ChatterjeeApple Inc.Verified email at apple.com
Fei FangCarnegie Mellon UniversityVerified email at cmu.edu
Jie FuUniversity of FloridaVerified email at ufl.edu
Follow
Charles Kamhoua
IEEE Fellow, Team Leader, DEVCOM Army Research Laboratory
Verified email at army.mil