Get my own profile
Public access
View all22 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Yuliang ZhengProfessor & Chair, Computer Science, University of Alabama at BirminghamVerified email at uab.edu
Joonsang BaekSenior Lecturer, University of Wollongong, AustraliaVerified email at uow.edu.au
Scott ContiniVerified email at cocoondata.com
Keita XagawaNTT Secure Platform LaboratoriesVerified email at hco.ntt.co.jp
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
Hossein GhodosiSenior Lecturer, College of Business, Law and Governance, James Cook UniversityVerified email at jcu.edu.au
Arjen LenstraProfessor of Computer Science, EPFLVerified email at epfl.ch
Tancrède LepointResearch Scientist, GoogleVerified email at google.com
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Mu-En Wu (吳牧恩, mnwu)臺北科技大學資訊與財金管理系Verified email at ntut.edu.tw