Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Sandeep Kumar ShuklaInternational Institute of Information Technology (IIIT) HyderabadVerified email at iiit.ac.in
Bikash SahaPhD Scholar, CSE Dept, IIT KanpurVerified email at cse.iitk.ac.in
Sunita DhavaleAssociate Professor, Dept. of Computer engineering, Defence Institute of Advanced Technology, PuneVerified email at diat.ac.in
Ramesh Karri కర్రి రమేష్Professor of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
Meet UdeshiPhD Student, Center for Cybersecurity, New York UniversityVerified email at nyu.edu
Farshad KhorramiProfessor of Electrical and Computer Engineering, NYUVerified email at nyu.eduBrendan Dolan-GavittNew York UniversityVerified email at nyu.edu
Ayushi MishraUniversity of Maryland, College ParkVerified email at umd.edu
Priyanka BagadeIndian Institute of Technology, KanpurVerified email at iitk.ac.inRahul KumarData Scientist, DemandbaseVerified email at demandbase.com
Soumyo V. ChakrabortyWharton School, Virginia Tech, Two Sigma InvestmentsVerified email at wharton.upenn.edu
Joheen ChakrabortyGraduate Student, MITVerified email at mit.edu
Davide BalzarottiProfessor, EurecomVerified email at eurecom.fr
Simone AonzoEURECOMVerified email at eurecom.fr
Juan CaballeroResearch Professor, IMDEA Software InstituteVerified email at imdea.org
Savino DambraGen DigitalVerified email at gendigital.com