Get my own profile
Public access
View all38 articles
7 articles
available
not available
Based on funding mandates
Co-authors
- Renato FigueiredoProfessor of Electrical and Computer Engineering, University of FloridaVerified email at acis.ufl.edu
- Jose FortesUniversity of FloridaVerified email at ufl.edu
- Raju RangaswamiFlorida International UniversityVerified email at cs.fiu.edu
- Dulcardo ArteagaPh.D. Florida International UniversityVerified email at fiu.edu
- saman biookaghazadehArizona State UniversityVerified email at asu.edu
- Xu YiqiFlorida International UniversityVerified email at fiu.edu
- Kaushik DuttaSchool of Information Systems and Management, University of South FloridaVerified email at usf.edu
- Andréa MatsunagaResearch Scientist, University of FloridaVerified email at ufl.edu
- Jason LiuProfessor, Florida International UniversityVerified email at cis.fiu.edu
- Swaminathan SundararamanIBM ResearchVerified email at cs.wisc.edu
- Mauricio TsugawaProfessor of ECE, University of FloridaVerified email at acis.ufl.edu
- Hector Duran-LimonUniversidad de GuadalajaraVerified email at cucea.udg.mx
- Jack DiGiovannaVelseraVerified email at velsera.com
- jose principeprofessor of ECE, U. of FloridaVerified email at cnel.ufl.edu
- Prapaporn RattanatamrongComputer Science, Thammasat UniversityVerified email at staff.tu.ac.th
- Charles KamhouaDEVCOM Army Research Laboratory, Adversarial Resilient Cyber Methodology Team LeaderVerified email at army.mil
- Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
- Michael K LangLos Alamos National LaboratoryVerified email at lanl.gov
- Eric Van HensbergenArmVerified email at arm.com
- Tong ZhangRensselaer Polytechnic InstituteVerified email at ecse.rpi.edu