Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
Anna ScaglioneProfessor of Electrical and Computer Engineering, Cornell UniversityVerified email at cornell.edu
Emiliano Dall'AneseUniversity of Colorado BoulderVerified email at colorado.edu
Andrey BernsteinSenior Scientist/Group Manager, National Renewable Energy Laboratory (NREL)Verified email at nrel.gov
Hoi-To WaiAssistant Professor, The Chinese University of Hong KongVerified email at se.cuhk.edu.hk
Ciaran RobertsUC Berkeley/Lawrence Berkeley National LabVerified email at lbl.gov
Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisVerified email at ucdavis.edu
Mahdi JameiInvenia LabsVerified email at invenialabs.co.uk
György DánProfessor, KTH Royal Institute of TechnologyVerified email at kth.se
Teklemariam TesfayCybersecurity EngineerVerified email at jpl.nasa.gov
Reinhard GentzAmazonVerified email at amazon.com
Andreas SpaniasArizona State UniversityVerified email at asu.edu
Cihan TepedelenliogluArizona State UniversityVerified email at asu.edu
Ignacio Losada CarreńoCornell UniversityVerified email at cornell.edu
David PinneyAnalytics Program Manager, NRECAVerified email at NRECA.coop
Ezzeldin ShereenPhD Candidate, KTH Royal Institute of Technology, SwedenVerified email at kth.se
Daniel ArnoldLawrence Berkeley National LaboratoryVerified email at lbl.gov
Sy Toan NgoLawrence Berkeley National LabVerified email at lbl.gov
Neelesh B. MehtaIndian Institute of Science, BangaloreVerified email at ece.iisc.ernet.in
Chandra MurthyProfessor, ECE, Indian Institute of ScienceVerified email at iisc.ac.in
Geethu JosephDelft University of TechnologyVerified email at tudelft.nl
Follow
Raksha Ramakrishna
Postdoctoral Researcher, KTH Royal Institute of Technology
Verified email at kth.se - Homepage