Get my own profile
Public access
View all26 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Christoph EggerChalmers University of TechnologyVerified email at chalmers.se
Hoover H. F. YinThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Tim RuffingVerified email at real-or-random.org
Kam-Fung (Henry) CheungUniversity of New South WalesVerified email at unsw.edu.au
Hong-Sheng ZhouVirginia Commonwealth UniversityVerified email at vcu.edu
Kai-Min ChungInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Yu-Chi ChenDepartment of Computer Science and Information Engineering, National Taipei University of TechnologyVerified email at ntut.edu.tw
Wei-Kai LinUniversity of VirginiaVerified email at virginia.edu
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Ka Hei NgDepartment of Physics and Institute of Theoretical Physics, The Chinese University of Hong KongVerified email at link.cuhk.edu.hk
Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
Anthony Man-Cho SoDepartment of Systems Engineering and Engineering Management, The Chinese University of Hong KongVerified email at se.cuhk.edu.hk
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Xavier BultelINSA Centre-Val de LoireVerified email at insa-cvl.fr
Markus ZoppeltVerified email at zoppelt.net
Victor Isaac KolobovTechnionVerified email at campus.technion.ac.il
Dominique SchröderFull Professor, Computer Science, TU Wien