Aisling Connolly | Worldline |
Alex Biryukov | University of Luxembourg |
Amin Kharraz | Florida International University |
Andrea Lanzi | University of Milan |
Aravind Machiry | Purdue University |
Aydin Aysu | NC State |
Betül Durak | Microsoft Research |
Bo Chen | Michigan Technological University |
Byoungyoung Lee | Seoul National University |
Chao Zhang | Institute for Network Science and Cyberspace of Tsinghua University |
Chenggang Wu | Chinese Academy of Sciences |
Chengyu Song | UC Riverside |
Cong Wang | City University of Hong Kong |
Cristian-Alexandru Staicu | CISPA Helmholtz Center for Information Security |
Dali Kaafar | Macquarie University, Australia |
Daniel Gruss | Graz University of Technology |
Daniele Antonioli | EURECOM |
Dave (Jing) Tian | Purdue University |
Debin Gao | Singapore Management University |
Dimitrios Papadopoulos | Hong Kong University of Science and Technology |
Ding Wang | Nankai University |
Doowon Kim | University of Tennessee, Knoxville |
Duong Hieu PHAN | Telecom Paris, Institut Polytechnique de Paris, FRANCE |
Fengwei Zhang | Southern University of Science and Technology (SUSTech) |
Georgios Portokalidis | Stevens Institute of Technology |
Ghassan Karame | Ruhr University Bochum |
Giancarlo Pellegrino | CISPA Helmholtz Center for Information Security |
Guofei Gu | Texas A&M |
Guomin Yang | University of Wollongong |
Guoxing Chen | Shanghai Jiao Tong University |
Haehyun Cho | Soongsil University |
Herve Debar | Telecom SudParis |
Hong Hu | Penn State University |
Hongxin Hu | University at Buffalo |
Ivan De Oliveira Nunes | Rochester Institute of Technology |
Jason (Minhui) Xue | The University of Adelaide |
Jesus Diaz Vico | IBM Research GmbH |
Jie Yang | Florida State University |
Jin-Hee Cho | Virginia Tech |
Jingqiang Lin | School of Cyber Security, University of Science and Technology of China |
Jiska Classen | SEEMOO, TU Darmstadt |
Joaquin Garcia-Alfaro | Institut Mines-Telecom & Institut Polytechnique de Paris |
John Mitchell | Stanford |
John Junghwan Rhee | University of Central Oklahoma |
Jorge Blasco | Royal Holloway, University of London |
Jun Sakuma | University of Tsukuba |
Jun Xu | University of Utah |
Kangjie Lu | University of Minnesota |
Katsunari Yoshioka | Yokohama National University, Japan |
Kazue Sako chair | Waseda University |
Kevin Hamlen | University of Texas at Dallas |
Kevin Yeo | Google |
Khoa Nguyen | |
Kwok-Yan Lam | Nanyang Technological University |
Lannan Luo | University of South Carolina |
Lejla Batina | Radboud University |
Liqun Chen | University of Surrey |
Luca Vigano | King's College London |
Mahdi Nasrullah Al-Ameen | Utah State University |
Mark Manulis | University of Surrey |
Martin Ochoa | Appgate Inc. |
Mathy Vanhoef | KU Leuven |
Mauro Conti | University of Padua |
Maverick Woo | Carnegie Mellon University |
Melek Önen | EURECOM |
Michael Waidner | ATHENE, TU Darmstadt, Fraunhofer SIT |
Mitsuaki Akiyama | NTT |
Miyako Ohkubo | NICT |
Mu Zhang | University of Utah |
Neil Gong | Duke University |
Nils Ole Tippenhauer | CISPA Helmholtz Center for Information Security |
Ning Zhang | Washington University in St. Louis |
Nitesh Saxena | The University of Alabama at Birmingham |
Olga Gadyatskaya | Leiden University |
Peng Liu | The Pennsylvania State University |
Qi Li | Tsinghua University |
Qiang Tang | The University of Sydney |
Rolf Oppliger | eSECURITY Technologies |
Ruoyu "Fish" Wang | Arizona State University |
Sang Kil Cha | KAIST |
Satoshi Obana | Hosei University |
Sencun Zhu | The Pennsylvania State University |
Seung Geol Choi | US Naval Acadeamy |
Sherman S. M. Chow | Chinese University of Hong Kong, Hong Kong |
Shiqing Ma | Rutgers University |
Shuai Wang | HKUST |
Stefan Katzenbeisser | University of Passau |
Sungwook Kim | Seoul Women's University |
Sushmita Ruj | Indian Statistical Institute, Kolkata |
Taegyu Kim | Pennsylvania State University |
Tatsuya Mori | Waseda University |
Tianhao Wang | Carnegie Mellon University and University of Virginia |
Tianwei Zhang | Nanyang Technological University |
Ting Yu | Qatar Computing Research Institute |
Veelasha Moonsamy | Ruhr University Bochum |
Wei Meng | The Chinese University of Hong Kong |
William Enck | North Carolina State University |
Willy Susilo | University of Wollongong |
Xiapu Luo | The Hong Kong Polytechnic University |
Xingliang YUAN | Monash University |
Xuhua Ding chair | Singapore Management University |
Yajin Zhou | Zhejiang University |
Yan Chen | Northwestern University |
Yang Liu | Nanyang Technological University |
Yang Zhang | CISPA Helmholtz Center for Information Security |
Yousra Aafer | University of Waterloo |
Yuan Zhang | Fudan University |
Yue Duan | Illinois Institute of Technology |
Yueqiang Cheng | NIO Security Research |
Yuhong Nan | Sun Yat-sen University |
Yusuke Sakai | National Institute of Advanced Industrial Science and Technology |
Zekeriya Erkin | Delft University of Technology |
Zhou Li | University of California, Irvine |