Get my own profile
Public access
View all11 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Aditya MathurPurdue University and Singapore University of Technology and DesignVerified email at cs.purdue.edu
Eunsuk KangAssistant Professor of Computer Science, Carnegie Mellon UniversityVerified email at cmu.edu
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Giedre SabaliauskaiteSystems Security Group, Coventry University, UKVerified email at coventry.ac.uk
Nandha Kumar KandasamyLite-On SingaporeVerified email at e.ntu.edu.sg
Daniele AntonioliEURECOMVerified email at eurecom.fr
Hamid Reza GhaeiniCISPA − Helmholtz Center for Information SecurityVerified email at ieee.org
Martín OchoaETH ZürichVerified email at inf.ethz.ch
Sicco VerwerDelft University of TechnologyVerified email at tudelft.nl
Qin Lin(林勤)EECS, Cleveland State UniversityVerified email at andrew.cmu.edu
David GarlanProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Daniel JacksonMITVerified email at mit.edu
Venkata Reddy PalletiAssistant Professor, Chemical Engineering, Indian Institute of Petroleum and EnergyVerified email at iipe.ac.in
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Christopher M. PoskittSingapore Management University (SMU)Verified email at smu.edu.sg
Chuadhry Mujeeb AhmedUniversity of StrathclydeVerified email at strath.ac.uk
Saman ZonouzAssociate Professor, Rutgers UniversityVerified email at rutgers.edu
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Ferdinand BrasserTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Follow