Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Omer KhanProfessor, University of ConnecticutVerified email at uconn.edu
- halit doganIntelVerified email at uconn.edu
- Farrukh HijazMeta's Reality LabsVerified email at uconn.edu
- Syed Kamran HaiderQualcommVerified email at uconn.edu
- Chenglu JinCWI AmsterdamVerified email at cwi.nl
- Devu Manikantan ShilaFounder & CEO @ Unknot.idVerified email at unknot.id
- Qingchuan ShiAMDVerified email at amd.com
- Awais M. KambohNational University of Sciences and Technology, IslamabadVerified email at seecs.edu.pk
- Akif RehmanUniversity of Connecticut, StorrsVerified email at uconn.edu
- Jose A. JoaoArmVerified email at utexas.edu
- Kartik LakshminarasimhanPhD student, Ghent UniversityVerified email at ugent.be
- Mohsin ShanUniversity of ConnecticutVerified email at uconn.edu
- Xinyu QueGoogleVerified email at google.com
- Daniele BuonoResearch Staff Member, IBM ResearchVerified email at ibm.com
- Fabio ChecconiRSM, IBM ResearchVerified email at us.ibm.com
- Matthew SeitaRochester Institute of TechnologyVerified email at g.rit.edu
- Rehan HafizInformation Technology University (ITU), Lahore, PakistanVerified email at itu.edu.pk
- Marten van DijkComputer Security, CWI, Amsterdam; Vrije Universiteit van Amsterdam; ECE Department UConn