Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Shou-De LinProfessor of Computer Science Department, National Taiwan UniversityVerified email at csie.ntu.edu.tw
Hsun-Ping HsiehNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Rui Yan (严睿)Renmin University of China. Previously with Peking U. and UPennVerified email at seas.upenn.edu
Mi-Yen YehResearch fellow at Institute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Jyun-Yu JiangSearch@AmazonVerified email at amazon.com
Jun PangUniversity of LuxembourgVerified email at uni.lu
Meeyoung ChaKAIST & IBSVerified email at kaist.ac.kr
Yu-Che TsaiNational Taiwan UniversityVerified email at ntu.edu.tw
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Tsung-Ting KuoAssistant Professor of Medicine, University of California San DiegoVerified email at ucsd.edu
Fang-Fei Chloris KuoGoogleVerified email at uw.edu
Ian En-Hsu YenPhD, Machine Learning Department, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Mathias HumbertUniversity of LausanneVerified email at unil.ch
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Hsuan-Tien LinProfessor of Computer Science and Information Engineering, National Taiwan UniversityVerified email at csie.ntu.edu.tw
Zhiqiang ZhongPostdoc at Aarhus UniversityVerified email at cs.au.dk
Kun-Ta ChuangNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Wei WangLeonard Kleinrock Professor in Computer Science, UCLAVerified email at cs.ucla.edu
Lun-Wei KuAssociate Research Fellow, Academia SinicaVerified email at iis.sinica.edu.tw
Sungkyu (Shaun) ParkKangwon National University (KNU)Verified email at kangwon.ac.kr