Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jens GrossklagsChair for Cyber Trust, Technical University of MunichEmail verificata su in.tum.de
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityEmail verificata su psu.edu
- Quanyan ZhuDepartment of Electrical and Computer Engineering, New York UniversityEmail verificata su nyu.edu
- Mohammad Mahdi KamaniSenior Member of Technical Staff, AMDEmail verificata su amd.com
- Mehmet Bahadir KirdanM.Sc Informatics at the TU MunichEmail verificata su tum.de
- Jeffrey PawlickEmail verificata su nyu.edu
- yezekael hayelUniversité d'AvignonEmail verificata su univ-avignon.fr
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Mehrdad MahdaviAssistant Professor of Computer Science, Pennsylvania State UniversityEmail verificata su psu.edu
- Mohammad Hossein ManshaeiIUT/EPFL/INRIAEmail verificata su epfl.ch
- Milad NasrGoogle DeepMindEmail verificata su srxzr.com
- Amir HoumansadrUniversity of Massachusetts AmherstEmail verificata su cs.umass.edu
- Jake WeidmanGoogleEmail verificata su google.com
- Yu PuPh.D. Student in Pennsylvania State UniversityEmail verificata su ist.psu.edu
- Le GuanSchool of Computing at the University of GeorgiaEmail verificata su uga.edu
- Pinyao GuoPennsylvania State UniversityEmail verificata su ist.psu.edu