Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Richa SinghProfessor, IIT JodhpurVerified email at iitj.ac.in
Mayank VatsaProfessor, IIT JodhpurVerified email at iitj.ac.in
Anush SankaranMicrosoft Security ResearchVerified email at microsoft.com
Saheb ChhabraIIIT-DVerified email at iiitd.ac.in
Puspita MajumdarPhD Scholar, IIIT-DelhiVerified email at iiitd.ac.in
Santanu ChaudhuryIIT DelhiVerified email at ee.iitd.ac.in
Kartik ThakralPh.D. Scholar, IIT JodhpurVerified email at iitj.ac.in
Surbhi MittalPh.D. Student, IIT JodhpurVerified email at iitj.ac.in
Shaan ChopraPhD Student, University of WashingtonVerified email at cs.washington.edu
Gaurav DhamaMastercard, IIT KanpurVerified email at mastercard.com
Ankur AroraMasterCard | IIM BangaloreVerified email at mastercard.com
Anil SurisettyVerified email at ee.iitr.ac.in
Deepak ChaurasiyaGraduate Student, New York UniversityVerified email at nyu.edu
Vikrant DeyStudent, Indian Institute of Technology RoorkeeVerified email at mt.iitr.ac.in
Aakriti TayalGraduated from IIIT-Delhi, SDE at AmazonVerified email at iiitd.ac.in
Archit TanejaGraduated from IIIT-Delhi, SDE at AmazonVerified email at iiitd.ac.in
Vasantha Kumar VenugopalCARPL.AIVerified email at carpl.ai
Nitish Kumarmastercard.comVerified email at email.iimcal.ac.in
Siddhartha AsthanaMastercardVerified email at iiitd.ac.in
Vishal M. PatelAssociate Professor, ECE, Johns Hopkins UniversityVerified email at jhu.edu