Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Shou-De LinNational Taiwan UniversityVerified email at csie.ntu.edu.tw
Hsun-Ping HsiehNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Yu-Che TsaiNational Taiwan UniversityVerified email at ntu.edu.tw
Rui Yan (严睿)Renmin University of China. Previously with Peking U. and UPennVerified email at seas.upenn.edu
Jun PangUniversity of LuxembourgVerified email at uni.lu
Mi-Yen YehResearch fellow at Institute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Meeyoung ChaMax Planck Institute for Security and Privacy (MPI-SP) and KAISTVerified email at mpi-sp.org
Zhiqiang ZhongPostdoc at Aarhus UniversityVerified email at cs.au.dk
Jyun-Yu JiangSearch@AmazonVerified email at amazon.com
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Lun-Wei KuResearch Fellow, Academia SinicaVerified email at iis.sinica.edu.tw
Tsung-Ting KuoAssistant Professor of Medicine, University of California San DiegoVerified email at ucsd.edu
Fang-Fei Chloris KuoGoogleVerified email at uw.edu
Mathias HumbertUniversity of LausanneVerified email at unil.ch
Ian En-Hsu YenPhD, Machine Learning Department, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Wei WangLeonard Kleinrock Professor in Computer Science, UCLAVerified email at cs.ucla.edu
Hsuan-Tien LinProfessor of Computer Science and Information Engineering, National Taiwan UniversityVerified email at csie.ntu.edu.tw
Kun-Ta ChuangNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Sungkyu ParkKDI SCHOOL of Public Policy and ManagementVerified email at kdischool.ac.kr