Get my own profile
Public access
View all17 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Xiaolu HouFaculty of Informatics and Information Technologies, Slovak University of Technology, SlovakiaVerified email at stuba.sk
Yoo-Seung WonNanyang Technological University Scientist ResearcherVerified email at kookmin.ac.kr
Debdeep MukhopadhyayProfessor, Dept of Computer Science and Engineering, IIT Kharagpur, IndiaVerified email at cse.iitkgp.ac.in
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Sayandeep SahaPostdoctoral Researcher, UCLouvain, BelgiumVerified email at uclouvain.be
Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeVerified email at ntu.edu.sg
Anubhab BaksiNanyang Technological University, SingaporeVerified email at e.ntu.edu.sg
Prasanna RaviResearch Scientist, Temasek Labs@Nanyang Technological University, SingaporeVerified email at ntu.edu.sg
Siang Meng SimDSO National Laboratories