Get my own profile
Public access
View all33 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.itSherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Christoph EggerChalmers University of TechnologyVerified email at chalmers.se
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Hoover H. F. YinThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Tim RuffingVerified email at real-or-random.org
Jiafan WangCSIRO's Data61Verified email at csiro.au
Nico DöttlingHelmholtz Center for Information Security (CISPA)Verified email at cispa.de
Ngoc Khanh NguyenKing's College LondonVerified email at kcl.ac.uk
Ahmadreza RahimiMax Planck Institute for Security and PrivacyVerified email at ahmadreza.io
David BalbásPhD Student, IMDEA Software InstituteVerified email at imdea.org
Harry W. H. WongThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hkDario FioreAssociate Research Professor, IMDEA Software InstituteVerified email at imdea.org
Kam-Fung (Henry) CheungUniversity of New South WalesVerified email at unsw.edu.au
Hong-Sheng ZhouVirginia Commonwealth UniversityVerified email at vcu.edu
Kai-Min ChungInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Yu-Chi ChenDepartment of Computer Science and Information Engineering, National Taipei University of TechnologyVerified email at ntut.edu.tw
Wei-Kai LinUniversity of VirginiaVerified email at virginia.edu
Dario CatalanoProfessor of Computer Science, University of CataniaVerified email at dmi.unict.it
Darya KavianiPh.D. Student, UC BerkeleyVerified email at berkeley.edu