Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Martha LarsonRadboud UniversityVerified email at ru.nl
Zhuoran LiuRadboud UniversityVerified email at cs.ru.nl
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yun ShenNetAppVerified email at netapp.com
Chao ShenProfessor, Xi'an Jiaotong UniversityVerified email at cmu.edu
Hanwei ZhangSaarland University; Institute of Intelligent Software, GuangzhouVerified email at depend.uni-saarland.de
Benjamin BischkeGerman Research Center for Artificial Intelligence, Vision Impulse, NVIDIA AI LabVerified email at dfki.de
Chenhao LinXi'an JiaoTong UniversityVerified email at xjtu.edu.cn
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Tianhao WangUniversity of VirginiaVerified email at virginia.edu
Xinlei HeAssistant Professor, HKUST(GZ)Verified email at hkust-gz.edu.cn
Tianshuo CongTsinghua Shuimu Postdoctoral ScholarVerified email at mail.tsinghua.edu.cn
Tom HeskesProfessor of Computer Science and Artificial Intelligence, Radboud University NijmegenVerified email at science.ru.nl
Bruno LepriFondazione Bruno KesslerVerified email at fbk.eu
Nicu SebeUniversity of TrentoVerified email at unitn.it
Veelasha MoonsamyProfessor at Ruhr University Bochum, GermanyVerified email at veelasha.org