Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Haixu TangProfessor, Indiana UniversityVerified email at indiana.edu
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
Reza ShokriAssistant Professor, National University of SingaporeVerified email at comp.nus.edu.sg
Thomas RistenpartAssociate Professor of Computer Science, Cornell TechVerified email at cornell.edu
Paul GrubbsUniversity of MichiganVerified email at umich.edu
Yunhui LongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Xiaorui PanIndiana UniversityVerified email at indiana.edu
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
Diyue BuPh.D. of bioinformatics, Indiana University; Veracyte Inc SSFVerified email at veracyte.com
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Ersin UzunRIT ESL Global Cybersecurity InstituteVerified email at rit.edu
Shantanu RaneResearch Area Manager, Cyber-Physical Systems Security, Xerox PARC.Verified email at parc.com
Yinqian ZhangProfessor, Southern University of Science and TechnologyVerified email at acm.org
Guoxing ChenAssistant Professor of Computer Science & Engineering Department, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Wenhao WangInstitute of Information Engineering, CASVerified email at iie.ac.cn
Kevin SekniqiPhD Computer Science, Cornell UniversityVerified email at sekniqi.com
Kévin HugueninProfessor, Université de Lausanne (UNIL)Verified email at unil.ch
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Julien FreudigerAppleVerified email at frdgr.ch
Follow
Vincent Bindschaedler
Assistant Professor at the University of Florida
Verified email at cise.ufl.edu - Homepage