Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Zhuoran LiuRadboud UniversityVerified email at cs.ru.nl
- Martha LarsonRadboud UniversityVerified email at ru.nl
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Chao ShenDistinguished Professor, Xi'an Jiaotong UniversityVerified email at cmu.edu
- Chenhao LinXi'an JiaoTong UniversityVerified email at xjtu.edu.cn
- Yun ShenNetAppVerified email at netapp.com
- Benjamin BischkeGerman Research Center for Artificial Intelligence, Vision Impulse, NVIDIA AI LabVerified email at dfki.de
- Hanwei ZhangSaarland University; Institute of Intelligent Software, GuangzhouVerified email at depend.uni-saarland.de
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Tianhao WangUniversity of VirginiaVerified email at virginia.edu
- Xinlei HeAssistant Professor, HKUST(GZ)Verified email at hkust-gz.edu.cn
- Zheng LiCISPA Helmholtz Center for Information Security.Verified email at cispa.de
- Tianshuo CongTsinghua Shuimu Postdoctoral ScholarVerified email at mail.tsinghua.edu.cn
- Veelasha MoonsamyProfessor at Ruhr University Bochum, GermanyVerified email at veelasha.org
- Tom HeskesProfessor of Computer Science and Artificial Intelligence, Radboud University NijmegenVerified email at science.ru.nl
- Bruno LepriFondazione Bruno Kessler/Ipazia S.p.a.Verified email at fbk.eu
- Nicu SebeUniversity of TrentoVerified email at unitn.it