Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Abhik RoychoudhuryProfessor of Computer Science, National University of SingaporeVerified email at comp.nus.edu.sg
Van-Thuan PhamLecturer, School of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de
Ezekiel SoremekunSnT, University of LuxembourgVerified email at uni.lu
Sudipta ChattopadhyayAssistant Professor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Bruno C. d. S. OliveiraAssistant Professor, The University of Hong KongVerified email at cs.hku.hk
Manh-Dung NguyenResearch Engineer, MontimageVerified email at montimage.com
Soumya PaulResearch Associate, Université du LuxembourgVerified email at uni.lu
Andrew SantosaVeracodeVerified email at Veracode.com
Rahul GopinathThe University of SydneyVerified email at gopinath.org
Gordon FraserProfessor of Computer Science, University of PassauVerified email at uni-passau.de
Sergey MechtaevLecturer of Software Engineering, University College LondonVerified email at ucl.ac.uk
Jooyong YiUlsan National Institute of Science and TechnologyVerified email at unist.ac.kr
Shin Hwei TanAssistant Professor, Southern University of Science and Technology (SUSTECH)Verified email at sustech.edu.cn
Zhen DONGAssociate Professor at Fudan University in ChinaVerified email at fudan.edu.cn
Aldeida AletiA/Prof, Faculty of Information Technology, Monash UniversityVerified email at monash.edu
Burak TurhanProfessor, University of Oulu, FinlandVerified email at oulu.fi
Anjana PereraMonash UniversityVerified email at monash.edu
Sang Kil ChaSchool of Computing, KAISTVerified email at kaist.ac.kr
Valentin J.M. ManèsInformation Security ResearcherVerified email at kaist.ac.kr