Get my own profile
Public access
View all27 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- Christoph EggerChalmers University of TechnologyVerified email at chalmers.se
- Hoover H. F. YinThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- Tim RuffingVerified email at real-or-random.org
- Kam-Fung (Henry) CheungUniversity of New South WalesVerified email at unsw.edu.au
- Hong-Sheng ZhouVirginia Commonwealth UniversityVerified email at vcu.edu
- Kai-Min ChungInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
- Yu-Chi ChenDepartment of Computer Science and Information Engineering, National Taipei University of TechnologyVerified email at ntut.edu.tw
- Wei-Kai LinUniversity of VirginiaVerified email at virginia.edu
- Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
- Ka Hei NgDepartment of Physics and Institute of Theoretical Physics, The Chinese University of Hong KongVerified email at link.cuhk.edu.hk
- Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
- Anthony Man-Cho SoDepartment of Systems Engineering and Engineering Management, The Chinese University of Hong KongVerified email at se.cuhk.edu.hk
- Yuval IshaiTechnionVerified email at cs.technion.ac.il
- Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
- Xavier BultelINSA Centre-Val de LoireVerified email at insa-cvl.fr
- Markus ZoppeltVerified email at zoppelt.net
- Victor Isaac KolobovTechnionVerified email at campus.technion.ac.il
- Dominique SchröderFull Professor, Computer Science, TU Wien