Get my own profile
Public access
View all33 articles
1 article
available
not available
Based on funding mandates
Co-authors
Thomas EisenbarthUniversity of LübeckVerified email at uni-luebeck.de
Yarkin DorozAssistant Teaching ProfessorVerified email at wpi.edu
Gorka IrazoquiWorcester Polytechnic InstituteVerified email at wpi.edu
Mehmet Sinan InciSecurity ResearcherVerified email at nvidia.com
Daniel MoghimiSenior Research Scientist, GoogleVerified email at google.com
Berk GulmezogluIowa State UniversityVerified email at iastate.edu
Erkay SavasSabanci UniversityVerified email at sabanciuniv.edu
William J MartinWorcester Polytechnic InstituteVerified email at wpi.edu
Çetin Kaya KoçKoç LabVerified email at ucsb.edu
Jens-Peter KapsAssociate Professor of Electrical and Computer Engineering, George Mason UniversityVerified email at gmu.edu
Gizem S. CetinElectrical and Computer Engineering, Worcester Polytechnic InstituteVerified email at wpi.edu
Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Mark G. KarpovskyProfessor of Computer Engineering, Boston UniversityVerified email at bu.edu
Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
Pankaj RohatgiGoogleVerified email at google.com
Xinming HuangProfessor, Worcester Polytechnic InstituteVerified email at wpi.edu
Roel MaesSynopsysVerified email at synopsys.com
Aykutlu DanaPrincipal Scientist, Metamaterial TechnologiesVerified email at metamaterial.com
Berk BirandPh.D. Candidate, Columbia UniversityVerified email at ee.columbia.edu
Andreas ZanklSecurity Researcher, Fraunhofer AISECVerified email at aisec.fraunhofer.de