Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Quanyan ZhuDepartment of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
Mohammad Mahdi KamaniSenior Member of Technical Staff, AMDVerified email at amd.com
Mehmet Bahadir KirdanM.Sc Informatics at the TU MunichVerified email at tum.de
Jeffrey PawlickVerified email at nyu.edu
yezekael hayelUniversité d'AvignonVerified email at univ-avignon.fr
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Mehrdad MahdaviAssociate Professor of Computer Science, Pennsylvania State UniversityVerified email at psu.edu
Milad NasrGoogle DeepMindVerified email at srxzr.com
Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
Jake WeidmanGoogleVerified email at google.com
Yu PuPh.D. Student in Pennsylvania State UniversityVerified email at ist.psu.edu
Le GuanUniversity of GeorgiaVerified email at uga.edu
Pinyao GuoPennsylvania State UniversityVerified email at ist.psu.edu