Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jiangshan Yu (于江山)Associate Professor, University of SydneyVerified email at sydney.edu.au
Vincent GramoliUniversity of Sydney and EPFLVerified email at sydney.edu.au
Xiwei (Sherry) XuData61, CSIROVerified email at data61.csiro.au
Prof. Shiping ChenCSIRO Data61, AustraliaVerified email at data61.csiro.au
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Jianyu NiuResearch Assistant Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Carsten RudolphMonash University, Melbourne, AustraliaVerified email at monash.edu
Zhichun LuUniversity of SydneyVerified email at uni.sydney.edu.au
Nikos FoutrisSchool of Computer Science, University of ManchesterVerified email at manchester.ac.uk
Christos KotselidisAssociate Professor, University of ManchesterVerified email at manchester.ac.uk
Ren ZhangCryptape and NervosVerified email at cryptape.com
Chen Feng (冯宸)Associate Professor and Principal's Research Chair, University of British Columbia (Okanagan Campus)Verified email at ubc.ca
Marthie GroblerPrincipal Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Ahmad Salehi ShahrakiLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
David TseThomas Kailath and Guanghan Xu Professor, Stanford UniversityVerified email at stanford.edu
Zhimei SuiShanghai UniversityVerified email at shu.edu.cn
Yinqian ZhangProfessor, Southern University of Science and TechnologyVerified email at acm.org
Mingchao YuBabylonChain Inc.Verified email at babylonchain.io
Ertem Nusret TasPhD Student, Stanford UniversityVerified email at stanford.edu