Get my own profile
Public access
View all34 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
Axel Y. PoschmannVP of ProductVerified email at pqshield.com
S LingNanyang Technological UniversityVerified email at ntu.edu.sg
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Kazuhiko MinematsuNEC CorporationVerified email at nec.com
Xiaoyang DongAssociate Professor, Tsinghua UniversityVerified email at tsinghua.edu.cn
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Guozhen LiuUniversity of Chinese Academy of SciencesVerified email at ucas.ac.cn
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Bing SunNational University of Defense TechnologyVerified email at kuleuven.be