Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Kishor TrivediChaired Professor of Electrical and Computer Engineering, Duke UniversityVerified email at duke.edu
Francesco LongoAssistant Professor of Computer Engineering, Università degli Studi di MessinaVerified email at unime.it
Dan Dongseong KIMAssociate Professor, Cybersecurity Group, The University of Queensland, AustraliaVerified email at uq.edu.au
Upendra SharmaResearch Staff Member, IBM T. J. Watson Research CenterVerified email at us.ibm.com
Tridib MukherjeeGames24x7Verified email at games24x7.com
Souvik SenGoogleVerified email at google.com
Ravi Krishnan MuthukrishnanSenior Director, Product Security at Babylon HealthVerified email at ncsu.edu
PALANIANDAVAR VENKATESWARANProfessor of Electronics & Tele-Communication Engineering, Jadavpur UniversityVerified email at jadavpuruniversity.in
Jie XiongUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Romit Roy ChoudhuryProfessor of ECE and CS, University of Illinois at Urbana Champaign (UIUC)Verified email at illinois.edu
Salil Kumar SanyalProfessor of Electronics & Telecommunication Engineering, Jadavpur UniversityVerified email at ieee.org
Koustuv DasguptaGoldman SachsVerified email at gs.com
Aditya HegdeMicrosoft Certified Technology SpecialistVerified email at tcs.com
Stefano RussoProfessor of Computer Engineering, Università di Napoli Federico IIVerified email at unina.it
Ansuman BanerjeeProfessor, Indian Statistical InstituteVerified email at isical.ac.in
Soumi ChattopadhyayIndian Institute Information Technology, GuwahatiVerified email at isical.ac.in
Stefano SebastioINRIA Bretagne Atlantique, FranceVerified email at imtlucca.it
Corville AllenIBMVerified email at us.ibm.com
Senthil Nathan NIBM Research LabVerified email at cse.iitb.ac.in
Dario BruneoUniversità di MessinaVerified email at unime.it