Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Shou-De LinNational Taiwan UniversityVerified email at csie.ntu.edu.tw
- Hsun-Ping HsiehNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
- Rui Yan (严睿)Renmin University of China. Previously with Peking U. and UPennVerified email at seas.upenn.edu
- Yu-Che TsaiNational Taiwan UniversityVerified email at ntu.edu.tw
- Jun PangUniversity of LuxembourgVerified email at uni.lu
- Mi-Yen YehResearch fellow at Institute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
- Meeyoung ChaMax Planck Institute for Security and Privacy (MPI-SP) and KAISTVerified email at mpi-sp.org
- Zhiqiang ZhongPostdoc at Aarhus UniversityVerified email at cs.au.dk
- Jyun-Yu JiangSearch@AmazonVerified email at amazon.com
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Lun-Wei KuResearch Fellow, Academia SinicaVerified email at iis.sinica.edu.tw
- Tsung-Ting KuoAssistant Professor of Medicine, University of California San DiegoVerified email at ucsd.edu
- Fang-Fei Chloris KuoGoogleVerified email at uw.edu
- Mathias HumbertUniversity of LausanneVerified email at unil.ch
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Ian En-Hsu YenPhD, Machine Learning Department, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Wei WangLeonard Kleinrock Professor in Computer Science, UCLAVerified email at cs.ucla.edu
- Hsuan-Tien LinProfessor of Computer Science and Information Engineering, National Taiwan UniversityVerified email at csie.ntu.edu.tw
- Kun-Ta ChuangNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
- Sungkyu ParkKDI SCHOOL of Public Policy and ManagementVerified email at kdischool.ac.kr