Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Quanyan ZhuDepartment of Electrical and Computer Engineering, New York UniversityVerified email at nyu.edu
Mohammad Mahdi KamaniSenior Member of Technical Staff, AMDVerified email at amd.com
Mehmet Bahadir KirdanM.Sc Informatics at the TU MunichVerified email at tum.de
Jeffrey PawlickVerified email at nyu.edu
yezekael hayelUniversité d'AvignonVerified email at univ-avignon.fr
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Mehrdad MahdaviAssistant Professor of Computer Science, Pennsylvania State UniversityVerified email at psu.edu
Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
Milad NasrGoogle DeepMindVerified email at srxzr.com
Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Jake WeidmanGoogleVerified email at google.com
Yu PuPh.D. Student in Pennsylvania State UniversityVerified email at ist.psu.edu
Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
Pinyao GuoPennsylvania State UniversityVerified email at ist.psu.edu