Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
Shou-De LinNational Taiwan UniversityVerified email at csie.ntu.edu.tw
Hsun-Ping Hsieh (解巽評)Department of Electrical Engineering, National Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Yu-Che TsaiNational Taiwan UniversityVerified email at ntu.edu.tw
Rui Yan (严睿)Wuhan University. Previously Renmin U. of China. Peking U. and UPennVerified email at seas.upenn.edu
Jun PangUniversity of LuxembourgVerified email at uni.lu
Mi-Yen YehResearch fellow at Institute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Meeyoung ChaScientific Director at MPI-SP, Professor at KAIST, ACM Distinguished MemberVerified email at mpi-sp.org
Zhiqiang ZhongMSCA Postdoc & YIA Fellow at University of LuxembourgVerified email at uni.lu
Lun-Wei KuResearch Fellow, Academia SinicaVerified email at iis.sinica.edu.tw
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jyun-Yu JiangSearch@AmazonVerified email at amazon.com
Tsung-Ting KuoAssociate Professor of Biomedical Informatics & Data Science and of Surgery, Yale School of MedicineVerified email at yale.edu
Fang-Fei Chloris KuoGoogleVerified email at uw.eduIan En-Hsu YenPhD, Machine Learning Department, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Mathias HumbertUniversity of LausanneVerified email at unil.ch
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Wei WangLeonard Kleinrock Professor in Computer Science, UCLAVerified email at cs.ucla.edu
Hsuan-Tien LinProfessor of Computer Science and Information Engineering, National Taiwan UniversityVerified email at csie.ntu.edu.tw
Sungkyu (Shaun) ParkAssociate Professor at KDI SCHOOL of Public Policy and ManagementVerified email at kdischool.ac.kr
Kun-Ta ChuangNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw