Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Istemi Ekin AkkusNokia Bell LabsVerified email at mpi-sws.org
- Pramod BhatotiaTechnische Universität MünchenVerified email at tum.de
- Volker HiltNokia Bell LabsVerified email at nokia-bell-labs.com
- Christof FetzerTU DresdenVerified email at tu-dresden.de
- Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
- Ivica RimacNokia Bell LabsVerified email at nokia-bell-labs.com
- Paarijaat AdityaMax Planck Institute for Software Systems (MPI-SWS)Verified email at mpi-sws.org
- Le Quoc DoTU DresdenVerified email at se.inf.tu-dresden.de
- Zhuhua CaiGraduate Student, Rice UniversityVerified email at rice.edu
- Klaus SatzkeNokia Bell LabsVerified email at nokia-bell-labs.com
- Eng Keong LuaPhD in Computer Science (University of Cambridge, UK)Verified email at computer.org
- Wei WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
- Ennan ZhaiAlibaba GroupVerified email at alibaba-inc.com
- Feng YanUniversity of HoustonVerified email at central.uh.edu
- Cong TangTemi Group and Peking UniversityVerified email at infosec.pku.edu.cn
- Minchen YuThe Chinese University of Hong Kong, ShenzhenVerified email at cuhk.edu.cn
- Bryan FordEPFLVerified email at epfl.ch
- David WolinskyFacebookVerified email at fb.com
- Jia WangIEEE Fellow, Lead Inventive Scientist, AT&T Labs - ResearchVerified email at att.com
- Aman ShaikhGoogleVerified email at google.com