Get my own profile
Public access
View all16 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Debdeep MukhopadhyayProfessor, Dept of Computer Science and Engineering, IIT Kharagpur, IndiaVerified email at cse.iitkgp.ac.in
Debapriya Basu RoyAssistant Professor, IIT KanpurVerified email at cse.iitk.ac.in
Hart MontgomeryLinux FoundationVerified email at linuxfoundation.org
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Arnab BagR&D Engineer at IMECVerified email at iitkgp.ac.in
Abhishek ChakrabortyIntel CorporationVerified email at intel.com
Sayandeep SahaPostdoctoral Researcher, UCLouvain, BelgiumVerified email at uclouvain.be
Harishma BoyapallyResearch ScientistVerified email at ntu.edu.sg
Lorenz PannyTechnische Universität MünchenVerified email at yx7.cc
Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
Yash ShrivastavaProduct Security Engineer, QualcommVerified email at qti.qualcomm.com
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Zichen GuiETH ZurichVerified email at inf.ethz.ch
Urbi ChatterjeeAssistant Professor, CSE, IIT Kanpur and Alumni, SEAL, IIT KharagpurVerified email at cse.iitk.ac.in
Luca De FeoIBM Research ZürichVerified email at zurich.ibm.com
Ashrujit GhoshalCarnegie Mellon UniversityVerified email at cs.cmu.edu
Rajat SadhukhanIndian Institute of Technology Roorkee, IndiaVerified email at iitkgp.ac.in
Saikrishna BadrinarayananStaff Applied Researcher, LinkedInVerified email at linkedin.com
Pratyay MukherjeeSupra ResearchVerified email at supra.com
NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTVerified email at tcgcrest.org