Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
- Reza ShokriNational University of Singapore; MicrosoftVerified email at comp.nus.edu.sg
- Haixu TangProfessor, Indiana UniversityVerified email at indiana.edu
- Yunhui LongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
- Paul GrubbsUniversity of MichiganVerified email at umich.edu
- Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
- Xiaorui PanIndiana UniversityVerified email at indiana.edu
- Diyue BuPh.D. of bioinformatics, Indiana University; Veracyte Inc SSFVerified email at veracyte.com
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Ersin UzunGlobal Cybersecurity Institute, Rochester Institute of TechnologyVerified email at rit.edu
- Shantanu RaneResearch Area Manager, Cyber-Physical Systems Security, Xerox PARC.Verified email at parc.com
- Yinqian ZhangProfessor, Southern University of Science and TechnologyVerified email at acm.org
- Guoxing ChenAssistant Professor of Computer Science & Engineering Department, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
- Wenhao WangInstitute of Information Engineering, CASVerified email at iie.ac.cn
- David CashUniversity of ChicagoVerified email at cs.uchicago.edu
- Kevin SekniqiPhD Computer Science, Cornell UniversityVerified email at sekniqi.com
- Kévin HugueninProfessor, Université de Lausanne (UNIL)Verified email at unil.ch
- Julien FreudigerGoogleVerified email at frdgr.ch
Follow
Vincent Bindschaedler
Assistant Professor at the University of Florida
Verified email at cise.ufl.edu - Homepage