Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
- Mattavelli MarcoMER, Ecole Polytechnique Federale de Lausanne, EPFLVerified email at epfl.ch
- Roland SchmitzProfessor für Internet-Sicherheit, Hochschule der Medien, StuttgartVerified email at hdm-stuttgart.de
- C.-C. Jay KuoMing Hsieh Chair Professor in ECE-Systems, University of Southern CaliforniaVerified email at sipi.usc.edu
- Dietmar SaupeProfessor of Computer Science, University of Konstanz, GermanyVerified email at uni-konstanz.de
- Saeed UllahUniversity of Derby, UKVerified email at derby.ac.uk
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
- Simone Casale-BrunetEPFLVerified email at epfl.ch
- Endri BezatiComputing System Laboratory, Huawei Technologies ZurichVerified email at epfl.ch
- Ihab AmerAdvanced Micro Device (AMD)Verified email at amd.com
- Schuyler QuackenbushAudio Research LabsVerified email at audioresearchlabs.com
- Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
- Hassaan Khaliq Qureshi (Professor)SEECS, National University of Science and Technology (NUST), Islamabad, PakistanVerified email at seecs.edu.pk
- Veselin RakocevicDepartment of Engineering, City, University of LondonVerified email at city.ac.uk