Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Lydia Y. ChenUniversity of Neuchatel/ TU DelftEmail verificata su ieee.org
- Robert BirkeUniversità degli Studi Di TorinoEmail verificata su unito.it
- Sonia Ben MokhtarLIRIS CNRSEmail verificata su cnrs.fr
- Sophie CerfINRIAEmail verificata su inria.fr
- Stefanie RoosProfessor, University of Kaiserslautern-LandauEmail verificata su cs.rptu.de
- Maolong LvDelft Center for Systems and Control, Delft University of TechnologyEmail verificata su tudelft.nl
- Rui HanAssociate Professor, Beijing Institute of TechnologyEmail verificata su bit.edu.cn
- Nicolas MarchandCNRS-GIPSA-lab GrenobleEmail verificata su gipsa-lab.fr
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKEmail verificata su bham.ac.uk
- Han WuAssistant Professor (Lecturer) in Cyber Security, School of ECS, University of SouthamptonEmail verificata su soton.ac.uk
- Joel MeffordUCLAEmail verificata su g.ucla.edu
- Ioan LandauEmeritus Research Director, GIPSA-LABEmail verificata su gipsa-lab.grenoble-inp.fr
- Enkelejda KasneciProfessor at the Technical University of MunichEmail verificata su tum.de
- Yao RongPhD Student, Technical University of MunichEmail verificata su tum.de
- Sara BouchenakProfessor in Computer Science, INSA LyonEmail verificata su insa-lyon.fr