Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Kaihua QinYale UniversityVerified email at qin.ac
- Liyi ZhouImperial College LondonVerified email at imperial.ac.uk
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk
- Stefanos ChaliasosPhD student, Imperial College LondonVerified email at imperial.ac.uk
- Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Jens ErnstbergerTechnical University of MunichVerified email at tum.de
- Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
- Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
- Roger WattenhoferETH ZurichVerified email at ethz.ch
- Andrei Marian DanHitachi Energy ResearchVerified email at hitachienergy.com
- Dana Drachsler-CohenTechnionVerified email at ee.technion.ac.il
- Stefanie RoosProfessor, University of Kaiserslautern-LandauVerified email at cs.rptu.de
- Joshua David LindFounding Engineer, Aptos LabsVerified email at aptoslabs.com
- Panayiotis PanayiotouUniversity of BathVerified email at bath.ac.uk
- Sinisa MateticProgram Director, ETH ZurichVerified email at inf.ethz.ch
- Aritra DharHuawei Zurich Research CenterVerified email at huawei.com
- David M. SommerSystem Security Group, ETH ZürichVerified email at inf.ethz.ch
- Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
- Duc V. LeVisa ResearchVerified email at visa.com