Get my own profile
Public access
View all54 articles
11 articles
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Abhranil MaitiSecure Embedded Systems (SES) Lab, ECE, Virginia Tech, USAVerified email at vt.edu
Bilgiday YuceSecurity Researcher at IntelVerified email at vt.edu
Bo-Cheng LaiNational Yang Ming Chiao Tung University, Hsinchu, TaiwanVerified email at nycu.edu.tw
Eric Xu GuoProduct Security, Qualcomm Technology Inc.Verified email at vt.edu
Nahid Farhady GhalatySecurity ML EngineerVerified email at vt.edu
Leyla NazhandaliAssociate Professor, Bradley Department of Electrical and Computer Engineering, Virginia TechVerified email at vt.edu
Mostafa TahaAssistant Professor in the Systems and Computer Engineering Dept. of Carleton UniversityVerified email at sce.carleton.ca
Pantea KiaeiPhD Student, Worcester Polytechnic InstituteVerified email at wpi.edu
Yuan YaoSilicon Security Architect at GoogleVerified email at vt.edu
Chao WangUniversity of Southern CaliforniaVerified email at usc.edu
Archanaa S. KrishnanTexas InstrumentsVerified email at vt.edu
Kazuo SakiyamaThe University of Electro-CommunicationsVerified email at uec.ac.jp
Inyoung KimProfessor of Statistics, Virginia TechVerified email at vt.edu
Hassan EldibECEVerified email at aast.edu
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Ulkuhan GulerWorcester Polytecnic InstituteVerified email at wpi.edu
Luke McHalePh.D. Student, Texas A&M UniversityVerified email at tamu.edu
Sandeep ShuklaProfessor of Computer Science and EngineeringVerified email at cse.iitk.ac.in
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl