Get my own profile
Public access
View all24 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
Zhe LiuProfessor, Zhejiang UniversityVerified email at nuaa.edu.cn
Wai Kong LeeUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Anubhab BaksiLund University, SwedenVerified email at e.ntu.edu.sg
Reza AzarderakhshProfessor at FAU and Founder of PQSecureVerified email at fau.edu
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Yasuyuki NogamiOkayama universityVerified email at okayama-u.ac.jp
Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeVerified email at ntu.edu.sg
Amir JalaliMetaVerified email at linkedin.com
Pakize SanalPhD Candidate, Florida Atlantic UniversityVerified email at fau.edu
Patrick LongaPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
Mila AnastasovaFlorida Atlantic UniversityVerified email at fau.edu
Sujoy Sinha RoyAssociate Professor, TU GrazVerified email at tugraz.at
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Geovandro PereiraSecurity Engineer, LG Electronics, USAVerified email at uwaterloo.ca
Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
Mehran Mozaffari KermaniAssociate Professor of Computer Engineering at University of South FloridaVerified email at usf.edu
Sumanta ChakrabortyAssistant Professor, School of Physical Sciences, IACSVerified email at iacs.res.in
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Muhammad Khurram Khan[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]Verified email at ksu.edu.sa
Emrah KaragozAdvanced Micro Devices (AMD), Florida Atlantic UniversityVerified email at amd.com