Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Brian M SadlerArmy Research LaboratoryVerified email at mail.mil
Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
Richard J. KozickBucknell UniversityVerified email at bucknell.edu
Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Dilli P. SharmaUniversity of TorontoVerified email at utoronto.ca
Ram RamanathanChief Scientist, goTenna IncVerified email at gotenna.com
Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
Fikadu DagefuUS Army Research LaboratoryVerified email at mail.mil
Hamid KrimProfessor of ECE, Director of VISSTA Laboratory, North Carolina State UniversityVerified email at ncsu.edu
Zelin WanDepartment of Computer Science, Virginia TechVerified email at vt.edu
Siddharth PalRaytheon BBN TechnologiesVerified email at rtx.com
Minjune KimResearch Engineer@CSIRO's Data61 | Ex Samsung ElectronicsVerified email at csiro.au
Yash MahajanVirginia TechVerified email at vt.edu
Júlio MendonçaPostdoctoral researcher, CritiX, University of LuxembourgVerified email at uni.lu
Prithwish BasuRaytheon BBN TechnologiesVerified email at bu.edu
Michael BrodskyU.S. Army Research LaboratoryVerified email at army.mil
Ing-Ray ChenVirginia TechVerified email at vt.edu