Get my own profile
Public access
View all30 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
S LingVerified email at ntu.edu.sg
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Bing SunNational University of Defense TechnologyVerified email at kuleuven.be
guozhen liuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandVerified email at heig-vd.ch
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
Mu-En Wu (吳牧恩, mnwu)臺北科技大學資訊與財金管理系Verified email at ntut.edu.tw
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
HM SunProfessor of Computer Science, National Tsing Hua UniversityVerified email at cs.nthu.edu.tw