Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Shou-De LinNational Taiwan UniversityVerified email at csie.ntu.edu.tw
Hsun-Ping HsiehNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Rui Yan (严睿)Renmin University of China. Previously with Peking U. and UPennVerified email at seas.upenn.edu
Yu-Che TsaiNational Taiwan UniversityVerified email at ntu.edu.tw
Jun PangUniversity of LuxembourgVerified email at uni.lu
Mi-Yen YehResearch fellow at Institute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Meeyoung ChaDirector, Max Planck Institute for Security and Privacy (MPI-SP) & Professor, KAISTVerified email at mpi-sp.org
Jyun-Yu JiangSearch@AmazonVerified email at amazon.com
Zhiqiang ZhongPostdoc at Aarhus UniversityVerified email at cs.au.dk
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Lun-Wei KuResearch Fellow, Academia SinicaVerified email at iis.sinica.edu.tw
Tsung-Ting KuoAssistant Professor of Medicine, University of California San DiegoVerified email at ucsd.edu
Fang-Fei Chloris KuoGoogleVerified email at uw.edu
Mathias HumbertUniversity of LausanneVerified email at unil.ch
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Ian En-Hsu YenPhD, Machine Learning Department, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Wei WangLeonard Kleinrock Professor in Computer Science, UCLAVerified email at cs.ucla.edu
Hsuan-Tien LinProfessor of Computer Science and Information Engineering, National Taiwan UniversityVerified email at csie.ntu.edu.tw
Kun-Ta ChuangNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Sungkyu (Shaun) ParkKDI School of Public Policy and Management (KDIS)Verified email at kdischool.ac.kr