Crea il mio profilo
Accesso pubblico
Visualizza tutto55 articoli
10 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ingrid VerbauwhedeKU LeuvenEmail verificata su esat.kuleuven.be
- Abhranil MaitiSecure Embedded Systems (SES) Lab, ECE, Virginia Tech, USAEmail verificata su vt.edu
- Aydin AysuNorth Carolina State UniversityEmail verificata su vt.edu
- Bo-Cheng LaiNational Yang Ming Chiao Tung University, Hsinchu, TaiwanEmail verificata su nycu.edu.tw
- Nahid Farhady GhalatySecurity ML EngineerEmail verificata su vt.edu
- Eric Xu GuoProduct Security, Qualcomm Technology Inc.Email verificata su vt.edu
- Leyla NazhandaliAssociate Professor, Bradley Department of Electrical and Computer Engineering, Virginia TechEmail verificata su vt.edu
- Mostafa TahaAssistant Professor in the Systems and Computer Engineering Dept. of Carleton UniversityEmail verificata su sce.carleton.ca
- Chao WangUniversity of Southern CaliforniaEmail verificata su usc.edu
- Kazuo SakiyamaThe University of Electro-CommunicationsEmail verificata su uec.ac.jp
- Inyoung KimProfessor of Statistics, Virginia TechEmail verificata su vt.edu
- Hassan EldibECEEmail verificata su aast.edu
- Junfeng FanOpen Security ResearchEmail verificata su opsefy.com
- Sandeep ShuklaProfessor of Computer Science and EngineeringEmail verificata su cse.iitk.ac.in
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsEmail verificata su cs.ru.nl
- Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Email verificata su cs.columbia.edu
- Timothy SherwoodProfessor of Computer Science, UC Santa BarbaraEmail verificata su cs.ucsb.edu