Get my own profile
Public access
View all20 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Tianhao WangUniversity of VirginiaVerified email at virginia.edu
- Shibo HeProfessor, Department of Control, Zhejiang universityVerified email at zju.edu.cn
- Min ChenCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- JIMING CHENProfessor at Zhejiang UniversityVerified email at ieee.org
- Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
- Peng ChengProfessor, Zhejiang UniversityVerified email at zju.edu.cn
- Yun ShenNetAppVerified email at netapp.com
- Mathias HumbertUniversity of LausanneVerified email at unil.ch
- Heng ZHANGProfessor, Jiangsu Ocean University, ChinaVerified email at jou.edu.cn
- Shouling JiProfessor, Zhejiang University & Georgia Institute of TechnologyVerified email at gatech.edu
- Yunjun GaoProfessor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
- Junshan ZhangElectrical and Computer Engineering, UC Davis (Google Scholar not updated since 2020)Verified email at ucdavis.edu
- Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu
- John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu