Get my own profile
Public access
View all57 articles
11 articles
available
not available
Based on funding mandates
Co-authors
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Abhranil MaitiSecure Embedded Systems (SES) Lab, ECE, Virginia Tech, USAVerified email at vt.edu
- Bilgiday YuceSecurity Researcher at IntelVerified email at vt.edu
- Bo-Cheng LaiNational Yang Ming Chiao Tung University, Hsinchu, TaiwanVerified email at nycu.edu.tw
- Eric Xu GuoProduct Security, Qualcomm Technology Inc.Verified email at vt.edu
- Nahid Farhady GhalatySecurity ML EngineerVerified email at vt.edu
- Leyla NazhandaliAssociate Professor, Bradley Department of Electrical and Computer Engineering, Virginia TechVerified email at vt.edu
- Mostafa TahaAssistant Professor in the Systems and Computer Engineering Dept. of Carleton UniversityVerified email at sce.carleton.ca
- Pantea KiaeiPhD Student, Worcester Polytechnic InstituteVerified email at wpi.edu
- Yuan YaoSilicon Security Architect at GoogleVerified email at vt.edu
- Archanaa S. KrishnanTexas InstrumentsVerified email at vt.edu
- Chao WangUniversity of Southern CaliforniaVerified email at usc.edu
- Kazuo SakiyamaThe University of Electro-CommunicationsVerified email at uec.ac.jp
- Inyoung KimProfessor of Statistics, Virginia TechVerified email at vt.edu
- Hassan EldibECEVerified email at aast.edu
- Ulkuhan GulerWorcester Polytecnic InstituteVerified email at wpi.edu
- Junfeng FanOpen Security ResearchVerified email at opsefy.com
- Luke McHalePh.D. Student, Texas A&M UniversityVerified email at tamu.edu
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Sandeep ShuklaProfessor of Computer Science and EngineeringVerified email at cse.iitk.ac.in