Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Istemi Ekin AkkusNokia Bell LabsVerified email at mpi-sws.org
Pramod BhatotiaTechnische Universität MünchenVerified email at tum.de
Volker HiltNokia Bell LabsVerified email at nokia-bell-labs.com
Christof FetzerTU DresdenVerified email at tu-dresden.de
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Ivica RimacNokia Bell LabsVerified email at nokia-bell-labs.com
Paarijaat AdityaMax Planck Institute for Software Systems (MPI-SWS)Verified email at mpi-sws.org
Le Quoc DoTU DresdenVerified email at se.inf.tu-dresden.de
Zhuhua CaiGraduate Student, Rice UniversityVerified email at rice.edu
Klaus SatzkeNokia Bell LabsVerified email at nokia-bell-labs.com
Eng Keong LuaPhD in Computer Science (University of Cambridge, UK)Verified email at computer.org
Ennan ZhaiAlibaba GroupVerified email at alibaba-inc.com
Wei WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Feng YanUniversity of HoustonVerified email at central.uh.edu
Cong TangTemi Group and Peking UniversityVerified email at infosec.pku.edu.cn
Bryan FordEPFLVerified email at epfl.ch
David WolinskyFacebookVerified email at fb.com
Cheng LiUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
Jia WangIEEE Fellow, Lead Inventive Scientist, AT&T Labs - ResearchVerified email at att.com
Aman ShaikhGoogleVerified email at google.com