Get my own profile
Public access
View all31 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
S LingVerified email at ntu.edu.sg
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Bing SunNational University of Defense TechnologyVerified email at kuleuven.be
guozhen liuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Chun GuoShandong UniversityVerified email at sdu.edu.cn
Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandVerified email at heig-vd.ch
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
Gaëtan LeurentINRIAVerified email at inria.fr