Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
- Quanyan ZhuDepartment of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
- Mohammad Mahdi KamaniSenior Member of Technical Staff, AMDVerified email at psu.edu
- Mehmet Bahadir KirdanM.Sc Informatics at the TU MunichVerified email at tum.de
- Jeffrey PawlickVerified email at nyu.edu
- yezekael hayelUniversité d'AvignonVerified email at univ-avignon.fr
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Mehrdad MahdaviAssistant Professor of Computer Science, Pennsylvania State UniversityVerified email at psu.edu
- Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
- Milad NasrGoogle DeepMindVerified email at srxzr.com
- Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
- Jake WeidmanGoogleVerified email at google.com
- Yu PuPh.D. Student in Pennsylvania State UniversityVerified email at ist.psu.edu
- Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
- Pinyao GuoPennsylvania State UniversityVerified email at ist.psu.edu