Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Ramesh Karri కర్రి రమేష్Professor of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
- Jeyavijayan (JV) RajendranAssociate Professor of Electrical and Computer Engineering, Texas A&M UniversityVerified email at tamu.edu
- Jason M FungSenior Director, Offensive Security Research & Academic Research Engagement, Intel CorporationVerified email at intel.com
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
- Ozgur SinanogluProfessor of Electrical and Computer Engineering, New York University Abu DhabiVerified email at nyu.edu
- Xiaofei (Rex) GuoCulminate Inc.Verified email at culminatesecurity.com
- Naghmeh KarimiAssociate Professor, Computer Science & Electrical Eng., University of Maryland Baltimore CountyVerified email at umbc.edu
- Xueyang WangAlibaba GroupVerified email at nyu.edu
- Kanad Basu (কণাদ বসু)University of Texas at DallasVerified email at utdallas.edu
- Ramya Jayaram MastiAmpere ComputingVerified email at amperecomputing.com
- Sayak RaySecurity Researcher, Intel CorporationVerified email at intel.com
- Gorka IrazoquiWorcester Polytechnic InstituteVerified email at wpi.edu
- Thomas EisenbarthUniversity of LübeckVerified email at uni-luebeck.de
- Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu