Get my own profile
Public access
View all13 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Lydia Y. ChenUniversity of Neuchatel/ TU DelftVerified email at ieee.org
Robert BirkeUniversità degli Studi Di TorinoVerified email at unito.itBogdan RobuAssociate Professor Univ Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Maolong LvDelft Center for Systems and Control, Delft University of TechnologyVerified email at tudelft.nl
Sonia Ben MokhtarLIRIS CNRSVerified email at cnrs.fr
Stefanie RoosProfessor, University of Kaiserslautern-LandauVerified email at cs.rptu.de
Sophie CerfINRIAVerified email at inria.fr
Biplab SikdarProvost's Chair Professor, National University of SingaporeVerified email at nus.edu.sg
Jiayu LiPhD Student, University of Illinois, Urbana-ChampaignVerified email at illinois.eduAad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Rui HanProfessor at Beijing Institute of TechnologyVerified email at bit.edu.cn
Uzair JavaidNational University of SingaporeVerified email at u.nus.edu
Nicolas MarchandCNRS-GIPSA-lab GrenobleVerified email at gipsa-lab.fr
Han WuAssistant Professor (Lecturer) in Cyber Security, School of ECS, University of SouthamptonVerified email at soton.ac.uk
Enkelejda KasneciProfessor at the Technical University of MunichVerified email at tum.de
Yao RongPostdoc, Rice UniversityVerified email at rice.edu
Ioan LandauEmeritus Research Director, GIPSA-LABVerified email at gipsa-lab.grenoble-inp.frMilad AbdollahzadehResearch Scientist, Singapore Institute of Technology & BetterdataVerified email at singaporetech.edu.sg
Rishav ChourasiaNational University of SingaporeVerified email at comp.nus.edu.sg
Joel MeffordInstitute for Biological Psychiatry, Copenhagen University Hospital