Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Istemi Ekin AkkusNokia Bell LabsVerified email at mpi-sws.org
Pramod BhatotiaProfessor, TU MunichVerified email at tum.de
Volker HiltNokia Bell LabsVerified email at nokia-bell-labs.com
Christof FetzerTU DresdenVerified email at tu-dresden.de
Ivica RimacNokia Bell LabsVerified email at nokia-bell-labs.com
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Paarijaat AdityaMax Planck Institute for Software Systems (MPI-SWS)Verified email at mpi-sws.org
Wei WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Klaus SatzkeNokia Bell LabsVerified email at nokia-bell-labs.com
Le Quoc DoPrincipal Research Engineer - Huawei Munich Research CenterVerified email at huawei.com
Zhuhua CaiGraduate Student, Rice UniversityVerified email at rice.edu
Feng YanUniversity of HoustonVerified email at central.uh.edu
Eng Keong LuaPhD in Computer Science (University of Cambridge, UK)Verified email at computer.org
Ennan ZhaiAlibaba GroupVerified email at alibaba-inc.com
Minchen YuThe Chinese University of Hong Kong, ShenzhenVerified email at cuhk.edu.cn
Cong TangTemi Group and Peking UniversityVerified email at infosec.pku.edu.cn
Cheng LiUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
Bryan FordEPFLVerified email at epfl.ch
David WolinskyFacebookVerified email at fb.com
Jia WangIEEE Fellow, Lead Inventive Scientist, AT&T Labs - ResearchVerified email at att.com