Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kang G. ShinKevin & Nancy O'Connor Professor of Computer Science, University of MichiganVerified email at umich.edu
Dongyao ChenAssistant Professor of Computer Science, Shanghai Jiao Tong University (SJTU)Verified email at sjtu.edu.cn
Troy StacerUniversity of MichiganVerified email at umich.edu
Armin WasicekUniversity of California at BerkeleyVerified email at berkeley.edu
Arun GanesanUniversity of MichiganVerified email at umich.edu
Josiah BrunerGeorgia Institute of TechnologyVerified email at gatech.edu
Xiaoying PuApple Inc.Verified email at apple.com
Pedram MohajerAnsariVerified email at clemson.edu
Long ChengAssociate Professor, School of Computing, Clemson UniversityVerified email at clemson.edu
Mashrur ChowdhuryFounding Director, National Center for Transportation Cybersecurity and ResiliencyVerified email at clemson.edu
Richard BrooksProfessor, Computer Engineering, Clemson UniversityVerified email at acm.org
Bulut GozubuyukClemson UniversityVerified email at clemson.edu
Iwinosa AideyanComputer Engineering PhD Student , Clemson UniversityVerified email at g.clemson.edu
Fan BaiTechnical Fellow, General Motors Research; IEEE Fellow, ACM Distinguished ScientistVerified email at gm.com
Prachi JoshiComputer Engineering, Virginia TechVerified email at vt.edu
Kemal TepeU WindsorVerified email at uwindsor.ca
Noah T. CurranPhD Candidate, University of MichiganVerified email at umich.edu
Linxi ZhangAssistant Professor of Computer Science, Central Michigan UniversityVerified email at cmich.edu
Habeeb OlufowobiAssistant Professor, University of Texas at ArlingtonVerified email at uta.edu