Get my own profile
Public access
View all39 articles
14 articles
available
not available
Based on funding mandates
Co-authors
IAN F. AKYILDIZTruva Inc. , USAVerified email at truvainc.com
Pu WangUniversity of North Carolina at CharlotteVerified email at uncc.edu
Hongzhi GuoUniversity of Nebraska-LincolnVerified email at unl.edu
Josep Miquel JornetNortheastern UniversityVerified email at northeastern.edu
Mehmet C VuranDale M. Jensen Professor, University of Nebraska LincolnVerified email at cse.unl.edu
Kui RenProfessor and Dean of Computer Science, Zhejiang University, ACM/IEEE FellowVerified email at zju.edu.cn
Arupjyoti BhuyanDirector, INL Wireless Security InstituteVerified email at inl.gov
Lu SuAssociate Professor, Purdue UniversityVerified email at purdue.edu
Wenhao WangTencent, Peking University; State University of New York at BuffaloVerified email at pku.edu.cn
Sarankumar BalakrishnanVerified email at apple.com
Dimitrios KoutsonikolasAssociate Professor, Electrical and Computer Engineering Department, Northeastern UniversityVerified email at northeastern.edu
Rong YuGuangdong University of TechnologyVerified email at gdut.edu.cn
Haochen HuPhD, SUNY University at BuffaloVerified email at buffalo.edu
Sekhar Rajendran SekharanSenior Application Engineer, The MathWorks.IncVerified email at mathworks.com
Dimitris A PadosSchmidt Chair Professor of ECE and CS; Director, Center for Connected Autonomy and AI; FAUVerified email at fau.edu
Steven KisseleffSenior Scientist, PhDVerified email at iis.fraunhofer.de
Wolfgang GerstackerFriedrich-Alexander University Erlangen-NürnbergVerified email at LNT.de
Kalvik JakkalaUniversity of North Carolina at CharlotteVerified email at uncc.edu
Zhangyu LiAssistant professor of Electronics and Information Engineering, South-central Minzu UniversityVerified email at scuec.edu.cn
Qiaoqiang GanProfessor of MSE, KAUSTVerified email at kaust.edu.sa