Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Moustafa YoussefProf. of CSE, American University in Cairo, Fellow IEEE/ACMVerified email at aucegypt.edu
Ahmed Elgohary GhoneimMicrosoftVerified email at microsoft.com
Supriyo ChakrabortySenior Research Scientist, IBM ResearchVerified email at us.ibm.com
Souvik SenGoogleVerified email at google.com
Romit Roy ChoudhuryProfessor of ECE and CS, University of Illinois at Urbana Champaign, UIUCVerified email at illinois.edu
He WangHuaweiVerified email at huawei.com
Bo-Jhang HoPh.D of University of California, Los AngelesVerified email at cs.ucla.edu
Yash SharmaUniversity of Tübingen, Max Planck Institute for Intelligent SystemsVerified email at bethgelab.org
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Dave BrainesIBM Research, UKVerified email at uk.ibm.com
Richard John TomsettOnfidoVerified email at onfido.com
Federico CeruttiUniversity of BresciaVerified email at unibs.it
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Ramya RaghavendraIBM TJ Watson Research CenterVerified email at fb.com
Simon JulierUCLVerified email at cs.ucl.ac.uk
Kai-Wei ChangAssociate Professor, UCLAVerified email at kwchang.net
Amr AlanwarAssistant Professor, Technical University of MunichVerified email at tum.de
Bharathan BalajiSenior Applied Scientist, AmazonVerified email at amazon.com
Huan ZhangAssistant Professor at University of Illinois Urbana-ChampaignVerified email at illinois.edu