Get my own profile
Public access
View all76 articles
1 article
available
not available
Based on funding mandates
Co-authors
Andrzej MizeraPost-doc, University of LuxembourgVerified email at uni.lu
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Xihui ChenUniversity of LuxembourgVerified email at uni.lu
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Wan FokkinkProfessor of Computer Science, Vrije Universiteit AmsterdamVerified email at vu.nl
Qixia YuanUniversity of LuxembourgVerified email at uni.lu
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Cui SuUniversity of LuxembourgVerified email at uni.lu
Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
Zhiqiang ZhongPostdoc at Aarhus UniversityVerified email at cs.au.dk
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Jan Friso GrooteFull Professor (Hoogleraar), Eindhoven University of TechnologyVerified email at tue.nl
Chenyi ZhangOracle Labs AustraliaVerified email at oracle.com
Jaco van de PolProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Cheng-Te LiNational Cheng Kung UniversityVerified email at ncku.edu.tw
Thomas SauterProfessor of Systems Biology, University of LuxembourgVerified email at uni.lu
Naipeng DongThe University of QueenslandVerified email at uq.edu.au
Yuxin DengProfessor, East China Normal UniversityVerified email at sei.ecnu.edu.cn
Soumya PaulResearch Associate, Université du LuxembourgVerified email at uni.lu