Get my own profile
Public access
View all13 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Mario FritzFaculty CISPA Helmholtz Center for Information Security; Professor Saarland UniversityVerified email at cispa.de
- Ran XuSalesforce ResearchVerified email at salesforce.com
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Caiming XiongSalesforce ResearchVerified email at salesforce.com
- Larry DavisProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Shu ZhangSalesforce Inc.Verified email at salesforce.com
- Silvio SavareseAssociate Professor of Computer Science at Stanford UniversityVerified email at stanford.edu
- Juan Carlos NieblesResearch Director (Salesforce) & Adjunct Professor (Stanford University)Verified email at cs.stanford.edu
- Can QinSalesforceVerified email at salesforce.com
- Zheng LiProfessor, Shandong UniversityVerified email at sdu.edu.cn
- Dingfan ChenCISPA-Helmholtz Center for Information SecurityVerified email at cispa.de
- Peihua MaUniversity of MarylandVerified email at umd.edu
- Le XueSenior Applied Scientist, Salesforce ResearchVerified email at salesforce.com
- Yihao FengApple AIMLVerified email at apple.com
- Vladislav SkripniukResearch Engineer, Audatic GmbHVerified email at audatic.ai
- Stefano ErmonStanford UniversityVerified email at cs.stanford.edu
- Xinyi YangSalesforce ResearchVerified email at salesforce.com
- Artemis PanagopoulouUniversity of PennsylvaniaVerified email at seas.upenn.edu
- Huan WangSalesforce ResearchVerified email at yale.edu