Get my own profile
Public access
View all40 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cnLing SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
Yu SasakiNTT Social Informatics LabratoriesVerified email at ntt.comHuaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
S LingNanyang Technological UniversityVerified email at ntu.edu.sgAxel Y. PoschmannVP of ProductVerified email at pqshield.com
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.comIvica NikolićNational University of SingaporeVerified email at nus.edu.sg
Xiaoyang DongAssociate Professor, Tsinghua UniversityVerified email at tsinghua.edu.cn
Sumio MoriokaInterstellar Technologies Inc.Verified email at fb3.so-net.ne.jp
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Danping ShiInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Kazuhiko MinematsuNEC CorporationVerified email at nec.comEik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Chun Guo (郭淳)Shandong UniversityVerified email at sdu.edu.cn
Guozhen LiuUniversity of Chinese Academy of SciencesVerified email at ucas.ac.cn