Get my own profile
Public access
View all25 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Georgios PiliourasGoogle DeepMind, Singapore University of Technology and DesignVerified email at google.com
Pieter-Tjerk de BoerAssociate professor, University of TwenteVerified email at utwente.nlStefanos LeonardosLecturer in machine learning, King's College LondonVerified email at kcl.ac.uk
Paweł SzałachowskiVerified email at google.com
Werner ScheinhardtAssistant professor, University of TwenteVerified email at utwente.nl
Sarad VenugopalanSwansea UniversityVerified email at swansea.ac.ukBoudewijn R. HaverkortUniversity of TwenteVerified email at utwente.nl
Tien Tuan Anh DinhDeakin UniversityVerified email at deakin.edu.au
Mirco TribastoneIMT LuccaVerified email at imtlucca.it
Barnabé MonnotResearch Scientist, Ethereum Foundation ResearchVerified email at barnabemonnot.com
Jianying ZhouProfessor of Cybersecurity, IEEE Fellow, ACM Distinguished MemberVerified email at sutd.edu.sg
Ivan HomoliakAssociate Professor, Brno University of Technology & Slovak Technical UniversityVerified email at fit.vutbr.cz
Nicolas GastInriaVerified email at inria.fr
Jane HillstonProfessor of Quantitative Modelling, University of EdinburghVerified email at ed.ac.uk
Aung MawSoftware EngineerVerified email at dbs.com
Cheng FengSiemensVerified email at siemens.com
Stratis SkoulakisAarhus UniversityVerified email at epfl.ch
Bithin AlangotHuawei Munich Research CenterVerified email at huawei.com
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Guillaume MassonnetIMT AltantiqueVerified email at imt-atlantique.fr