Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
Hui SuMeiTuanVerified email at meituan.com
Wenjie LiThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Dietrich KlakowSaarland University, Saarland Informatics Campus, PharmaScienceHubVerified email at lsv.uni-saarland.de
Yang ZhaoIBM Research - Tokyo, JapanVerified email at ibm.com
Bill ByrneProfessor of Information Engineering, Cambridge UniversityVerified email at eng.cam.ac.uk
Aizawa AkikoNational Institute of InformaticsVerified email at nii.ac.jp
Weiwei ChengSenior Principal Scientist at ZalandoVerified email at zalando.de
Kentaro InuiMBZUAI, Tohoku University, RIKENVerified email at mbzuai.ac.ae
Jun SuzukiTohoku UniversityVerified email at tohoku.ac.jp
Satoshi SekineRIKEN, AIPVerified email at riken.jp
Youssef OualilSiri Speech, Apple Inc.Verified email at apple.com
Clayton GreenbergUniversity of PennsylvaniaVerified email at seas.upenn.edu
Mathias HumbertUniversity of LausanneVerified email at unil.ch
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland