Get my own profile
Public access
View all16 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
- Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
- Xiaolu HouFaculty of Informatics and Information Technologies, Slovak University of Technology, SlovakiaVerified email at stuba.sk
- Yoo-Seung WonNanyang Technological University Scientist ResearcherVerified email at kookmin.ac.kr
- Debdeep MukhopadhyayProfessor, Dept of Computer Science and Engineering, IIT Kharagpur, IndiaVerified email at cse.iitkgp.ac.in
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Sayandeep SahaPostdoctoral Researcher, UCLouvain, BelgiumVerified email at uclouvain.be
- Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeVerified email at ntu.edu.sg
- Anubhab BaksiNanyang Technological University, SingaporeVerified email at e.ntu.edu.sg
- Prasanna RaviResearch Scientist, Temasek Labs@Nanyang Technological University, SingaporeVerified email at ntu.edu.sg
- Siang Meng SimDSO National Laboratories