Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Dirmanto JapResearch ScientistVerified email at ntu.edu.sg
Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
Lei MaAssociate Professor, The University of Tokyo, Japan & University of Alberta, CanadaVerified email at acm.org
Mustafa KhairallahLund UniversityVerified email at e.ntu.edu.sg
Frederique OggierNanyang Technological UniversityVerified email at systems.caltech.edu
Anubhab BaksiNanyang Technological University, SingaporeVerified email at e.ntu.edu.sg
Martín OchoaUniversidad de Los AndesVerified email at uniandes.edu.co
Romain PoussierResearch Scientist, Nanyang Technological University, SingaporeVerified email at uclouvain.be
Jesús SolanoETH ZürichVerified email at inf.ethz.ch
Bingyang HuAuburn UniversityVerified email at auburn.edu
Yoo-Seung WonNanyang Technological University Scientist ResearcherVerified email at kookmin.ac.kr
Vishnu Asutosh DasuThe Pennsylvania State UniversityVerified email at psu.edu
Fuyuan ZhangMPI-SWSVerified email at mpi-sws.org
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Ruben RiosAssociate Professor, NICS Lab - University of MálagaVerified email at lcc.uma.es
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Zakaria NajmResearch Associate,NTU SingaporeVerified email at ntu.edu.sg
Francesco BertiBar-Ilan UniversityVerified email at biu.ac.il
Follow
Xiaolu Hou
Faculty of Informatics and Information Technologies, Slovak University of Technology, Slovakia
Verified email at stuba.sk - Homepage