Get my own profile
Public access
View all19 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
Zhe LiuProfessor, Nanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Wai Kong LeeGachon UniversityVerified email at gachon.ac.kr
Reza AzarderakhshAssociate Professor, Florida Atlantic UniversityVerified email at fau.edu
Yasuyuki NogamiOkayama universityVerified email at okayama-u.ac.jp
Amir JalaliLinkedIn CorporationVerified email at linkedin.com
Sujoy Sinha RoyAssistant Professor, IAIK, TU GrazVerified email at iaik.tugraz.at
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Anubhab BaksiNanyang Technological University, SingaporeVerified email at e.ntu.edu.sg
Patrick LongaPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
Pakize SanalPhD Candidate, Florida Atlantic UniversityVerified email at fau.edu
Geovandro PereiraUniversity of Waterloo, Institute for Quantum Computing and evolutionQ, CanadaVerified email at uwaterloo.ca
Xinyi Huang(黄欣沂)Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and TechnologyVerified email at ust.hk
Muhammad Khurram Khan[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]Verified email at ksu.edu.sa
Anupam ChattopadhyayAssociate Professor, SCSE, SPMS, NTU, SingaporeVerified email at ntu.edu.sg
Mila AnastasovaFlorida Atlantic UniversityVerified email at fau.edu
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Tobias OderHorst Görtz Institute for IT Security, Ruhr-Universität BochumVerified email at rub.de
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Mehran Mozaffari KermaniAssociate Professor of Computer Engineering at University of South FloridaVerified email at usf.edu