Get my own profile
Public access
View all72 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Andrzej MizeraPost-doc, University of LuxembourgVerified email at uni.lu
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Xihui ChenUniversity of LuxembourgVerified email at uni.lu
- Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
- Wan FokkinkProfessor of Computer Science, Vrije Universiteit AmsterdamVerified email at vu.nl
- Qixia YuanUniversity of LuxembourgVerified email at uni.lu
- Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
- Cui SuUniversity of LuxembourgVerified email at uni.lu
- Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
- Zhiqiang ZhongPostdoc at Aarhus UniversityVerified email at cs.au.dk
- Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
- Hugo JonkerOpen UniversiteitVerified email at ou.nl
- Jan Friso GrooteFull Professor (Hoogleraar), Eindhoven University of TechnologyVerified email at tue.nl
- Chenyi ZhangOracle Labs AustraliaVerified email at oracle.com
- Jaco van de PolProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Cheng-Te LiNational Cheng Kung UniversityVerified email at ncku.edu.tw
- Thomas SauterProfessor of Systems Biology, University of LuxembourgVerified email at uni.lu
- Naipeng DongThe University of QueenslandVerified email at uq.edu.au
- Yuxin DengProfessor, East China Normal UniversityVerified email at sei.ecnu.edu.cn
- Soumya PaulResearch Associate, Université du LuxembourgVerified email at uni.lu