Get my own profile
Public access
View all28 articles
15 articles
available
not available
Based on funding mandates
Co-authors
Ismail GuvencNorth Carolina State UniversityVerified email at ncsu.edu
Rudra DuttaProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Peter BauerProfessor of Electrical EngineeringVerified email at nd.edu
Jangeun JunNetApp, Inc.Verified email at netapp.com
Maria KihlProfessor in Internetworked Systems, Dept. of Electrical and Information Technology, Lund UniversityVerified email at eit.lth.se
Ozgur OzdemirAssociate Research ProfessorVerified email at ncsu.edu
Ajit WarrierSilvus TechnologiesVerified email at silvustechnologies.com
Injong RheeProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Simran SinghNorth Carolina State UniversityVerified email at ncsu.edu
Beakcheol JangYonsei UniversityVerified email at yonsei.ac.kr
Alex DeanAssociate Professor of Electrical and Computer Engineering, North Carolina State UniversityVerified email at ncsu.edu
Vuk MarojevicAssociate Professor, Mississippi StateVerified email at msstate.edu
Huaiyu DaiProfessor of Electrical and Computer Engineering, NC State UniversityVerified email at ncsu.edu
Sung Joon MaengHanyang University, ERICAVerified email at hanyang.ac.kr
Brian A. FloydAlton & Mildred Lancaster Professor in Electrical & Computer Engineering, NC State UniversityVerified email at ncsu.edu
Arupjyoti BhuyanDirector, INL Wireless Security InstituteVerified email at inl.gov
Frank MuellerProfessor of Computer Science, North Carolina State UniversityVerified email at cs.ncsu.edu
Magreth MushiResearch AssociateVerified email at ncsu.edu
Edgar LobatonNorth Carolina State UniversityVerified email at ncsu.edu
Tahmid Latif, PhDWentworth Institute of TechnologyVerified email at wit.edu