Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
- Jun XuAssistant Professor at The University of UtahVerified email at cs.utah.edu
- Thomas MaillartUniversity of GenevaVerified email at unige.ch
- Jorge LoboICREA - Universitat Pompeu FabraVerified email at upf.edu
- Minghui ZhuProfessor, Electrical Engineering and Computer Science, Pennsylvania State UniversityVerified email at psu.edu
- Pinyao GuoPennsylvania State UniversityVerified email at ist.psu.edu
- John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Chen ZhongThe University of TampaVerified email at ut.edu
- Dinghao WuPennsylvania State UniversityVerified email at psu.edu
- Dr. Poonam YadavA/ Professor & Senior Lecturer at Uni of York / Visiting Researcher at University of CambridgeVerified email at york.ac.uk
- Nicklaus A. GiacobeCollege of Information Sciences and Technology,The Pennsylvania State UniversityVerified email at ist.psu.edu
- Neela SawantDolby (Past: Amazon, Yahoo! R&D India, Penn State University, IIT Bombay)Verified email at dolby.com
- Fan YeProfessor of ECE, Stony Brook UniversityVerified email at stonybrook.edu
- Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu