Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kaihua QinImperial College LondonVerified email at imperial.ac.uk
Liyi ZhouImperial College LondonVerified email at imperial.ac.uk
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk
Stefanos ChaliasosPhD student, Imperial College LondonVerified email at imperial.ac.uk
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Andrei Marian DanHitachi Energy ResearchVerified email at hitachienergy.com
Dana Drachsler-CohenTechnionVerified email at ee.technion.ac.il
Jens ErnstbergerTechnical University of MunichVerified email at tum.de
Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
Stefanie RoosProfessor, University of Kaiserslautern-LandauVerified email at cs.rptu.de
Joshua David LindFounding Engineer, Aptos LabsVerified email at aptoslabs.com
Panayiotis PanayiotouETH ZurichVerified email at student.ethz.ch
Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
Sinisa MateticProgram Director, ETH ZurichVerified email at inf.ethz.ch
Aritra DharHuawei Zurich Research CenterVerified email at huawei.com
David M. SommerSystem Security Group, ETH ZürichVerified email at inf.ethz.ch
Roger WattenhoferETH ZurichVerified email at ethz.ch
Vedran CAPKUNHEC ParisVerified email at hec.fr