Get my own profile
Public access
View all22 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Tianhao WangUniversity of VirginiaVerified email at virginia.edu
Min ChenCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Shibo HeProfessor, Department of Control, Zhejiang universityVerified email at zju.edu.cn
JIMING CHENProfessor at Zhejiang UniversityVerified email at ieee.org
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Peng ChengProfessor, Zhejiang UniversityVerified email at zju.edu.cn
Yun ShenNetAppVerified email at netapp.com
Mathias HumbertUniversity of LausanneVerified email at unil.ch
Heng ZHANGProfessor, Jiangsu Ocean University, ChinaVerified email at jou.edu.cn
Yunjun GaoProfessor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
Shouling JiProfessor, Zhejiang University & Georgia Institute of TechnologyVerified email at gatech.edu
Junshan ZhangElectrical and Computer Engineering, UC Davis (Google Scholar not updated since 2020)Verified email at ucdavis.edu
Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu
John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu