Get my own profile
Public access
View all43 articles
11 articles
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Abhranil MaitiSecure Embedded Systems (SES) Lab, ECE, Virginia Tech, USAVerified email at vt.edu
Bo-Cheng LaiNational Yang Ming Chiao Tung University, Hsinchu, TaiwanVerified email at nycu.edu.tw
Aydin AysuNorth Carolina State UniversityVerified email at vt.edu
Eric Xu GuoProduct Security, Qualcomm Technology Inc.Verified email at vt.edu
Nahid Farhady GhalatySecurity ML EngineerVerified email at vt.edu
Leyla NazhandaliAssociate Professor, Bradley Department of Electrical and Computer Engineering, Virginia TechVerified email at vt.edu
Mostafa TahaAssistant Professor in the Systems and Computer Engineering Dept. of Carleton UniversityVerified email at sce.carleton.ca
Kazuo SakiyamaThe University of Electro-CommunicationsVerified email at uec.ac.jp
Chao WangUniversity of Southern CaliforniaVerified email at usc.edu
Inyoung KimAssociate Professor of Statistics, Virginia TechVerified email at vt.edu
Hassan EldibECEVerified email at aast.edu
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Sandeep ShuklaProfessor of Computer Science and EngineeringVerified email at cse.iitk.ac.in
Moti YungResearch Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Timothy SherwoodProfessor of Computer Science, UC Santa BarbaraVerified email at cs.ucsb.edu
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl