Get my own profile
Public access
View all54 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Abhranil MaitiSecure Embedded Systems (SES) Lab, ECE, Virginia Tech, USAVerified email at vt.edu
- Aydin AysuNorth Carolina State UniversityVerified email at vt.edu
- Bo-Cheng LaiNational Yang Ming Chiao Tung University, Hsinchu, TaiwanVerified email at nycu.edu.tw
- Nahid Farhady GhalatySecurity ML EngineerVerified email at vt.edu
- Eric Xu GuoProduct Security, Qualcomm Technology Inc.Verified email at vt.edu
- Leyla NazhandaliAssociate Professor, Bradley Department of Electrical and Computer Engineering, Virginia TechVerified email at vt.edu
- Mostafa TahaAssistant Professor in the Systems and Computer Engineering Dept. of Carleton UniversityVerified email at sce.carleton.ca
- Chao WangUniversity of Southern CaliforniaVerified email at usc.edu
- Kazuo SakiyamaThe University of Electro-CommunicationsVerified email at uec.ac.jp
- Inyoung KimProfessor of Statistics, Virginia TechVerified email at vt.edu
- Hassan EldibECEVerified email at aast.edu
- Junfeng FanOpen Security ResearchVerified email at opsefy.com
- Sandeep ShuklaProfessor of Computer Science and EngineeringVerified email at cse.iitk.ac.in
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
- Timothy SherwoodProfessor of Computer Science, UC Santa BarbaraVerified email at cs.ucsb.edu