Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
Hui SuMeiTuanVerified email at meituan.com
Wenjie LiThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Dietrich KlakowSaarland University, Saarland Informatics Campus, PharmaScienceHubVerified email at lsv.uni-saarland.de
Bill ByrneProfessor of Information Engineering, Cambridge UniversityVerified email at eng.cam.ac.uk
Yang ZhaoIBM Research - Tokyo, JapanVerified email at ibm.com
Aizawa AkikoNational Institute of InformaticsVerified email at nii.ac.jpWeiwei ChengDirector of Applied Science at ZalandoVerified email at zalando.de
Kentaro InuiMBZUAI, Tohoku University, RIKENVerified email at mbzuai.ac.ae
Jun SuzukiTohoku UniversityVerified email at tohoku.ac.jpSatoshi SekineLLMC, NIIVerified email at nii.ac.jp
Youssef OualilSiri Speech, Apple Inc.Verified email at apple.com
Clayton GreenbergUniversity of PennsylvaniaVerified email at seas.upenn.edu
Mathias HumbertUniversity of LausanneVerified email at unil.ch
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland