-
the supervision of the PI, including proposal development and preparation of high-quality publications in top computer security, privacy, embedded systems, sensing, and networking venues. Pursue research topics
-
on active research activities. Secondary Responsibilities Occasionally guest lecture or assist with course material development under the guidance of the PI. Contribute to student recruitment by participating
-
on active research activities. Secondary Responsibilities Occasionally guest lecture or assist with course material development under the guidance of the PI. Contribute to student recruitment by participating
-
the supervision of the PI, including proposal development and preparation of high-quality publications in top computer security, privacy, embedded systems, sensing, and networking venues. Pursue research topics
-
on active research activities. Secondary Responsibilities Occasionally guest lecture or assist with course material development under the guidance of the PI. Contribute to student recruitment by participating
-
proposal development and preparation of high-quality publications in top computer security, privacy, embedded systems, sensing, and networking venues. ● Pursue research topics such as protecting