Aisling Connolly |
Worldline |
Alex Biryukov |
University of Luxembourg |
Amin Kharraz |
Florida International University |
Andrea Lanzi |
University of Milan |
Aravind Machiry |
Purdue University |
Aydin Aysu |
NC State |
Betül Durak |
Microsoft Research |
Bo Chen |
Michigan Technological University |
Byoungyoung Lee |
Seoul National University |
Chao Zhang |
Institute for Network Science and Cyberspace of Tsinghua University |
Chenggang Wu |
Chinese Academy of Sciences |
Chengyu Song |
UC Riverside |
Cong Wang |
City University of Hong Kong |
Cristian-Alexandru Staicu |
CISPA Helmholtz Center for Information Security |
Dali Kaafar |
Macquarie University, Australia |
Daniel Gruss |
Graz University of Technology |
Daniele Antonioli |
EURECOM |
Dave (Jing) Tian |
Purdue University |
Debin Gao |
Singapore Management University |
Dimitrios Papadopoulos |
Hong Kong University of Science and Technology |
Ding Wang |
Nankai University |
Doowon Kim |
University of Tennessee, Knoxville |
Duong Hieu PHAN |
Telecom Paris, Institut Polytechnique de Paris, FRANCE |
Fengwei Zhang |
Southern University of Science and Technology (SUSTech) |
Georgios Portokalidis |
Stevens Institute of Technology |
Ghassan Karame |
Ruhr University Bochum |
Giancarlo Pellegrino |
CISPA Helmholtz Center for Information Security |
Guofei Gu |
Texas A&M |
Guomin Yang |
University of Wollongong |
Guoxing Chen |
Shanghai Jiao Tong University |
Haehyun Cho |
Soongsil University |
Herve Debar |
Telecom SudParis |
Hong Hu |
Penn State University |
Hongxin Hu |
University at Buffalo |
Ivan De Oliveira Nunes |
Rochester Institute of Technology |
Jason (Minhui) Xue |
The University of Adelaide |
Jesus Diaz Vico |
IBM Research GmbH |
Jie Yang |
Florida State University |
Jin-Hee Cho |
Virginia Tech |
Jingqiang Lin |
School of Cyber Security, University of Science and Technology of China |
Jiska Classen |
SEEMOO, TU Darmstadt |
Joaquin Garcia-Alfaro |
Institut Mines-Telecom & Institut Polytechnique de Paris |
John Mitchell |
Stanford |
John Junghwan Rhee |
University of Central Oklahoma |
Jorge Blasco |
Royal Holloway, University of London |
Jun Sakuma |
University of Tsukuba |
Jun Xu |
University of Utah |
Kangjie Lu |
University of Minnesota |
Katsunari Yoshioka |
Yokohama National University, Japan |
Kazue Sako chair |
Waseda University |
Kevin Hamlen |
University of Texas at Dallas |
Kevin Yeo |
Google |
Khoa Nguyen |
|
Kwok-Yan Lam |
Nanyang Technological University |
Lannan Luo |
University of South Carolina |
Lejla Batina |
Radboud University |
Liqun Chen |
University of Surrey |
Luca Vigano |
King's College London |
Mahdi Nasrullah Al-Ameen |
Utah State University |
Mark Manulis |
University of Surrey |
Martin Ochoa |
Appgate Inc. |
Mathy Vanhoef |
KU Leuven |
Mauro Conti |
University of Padua |
Maverick Woo |
Carnegie Mellon University |
Melek Önen |
EURECOM |
Michael Waidner |
ATHENE, TU Darmstadt, Fraunhofer SIT |
Mitsuaki Akiyama |
NTT |
Miyako Ohkubo |
NICT |
Mu Zhang |
University of Utah |
Neil Gong |
Duke University |
Nils Ole Tippenhauer |
CISPA Helmholtz Center for Information Security |
Ning Zhang |
Washington University in St. Louis |
Nitesh Saxena |
The University of Alabama at Birmingham |
Olga Gadyatskaya |
Leiden University |
Peng Liu |
The Pennsylvania State University |
Qi Li |
Tsinghua University |
Qiang Tang |
The University of Sydney |
Rolf Oppliger |
eSECURITY Technologies |
Ruoyu "Fish" Wang |
Arizona State University |
Sang Kil Cha |
KAIST |
Satoshi Obana |
Hosei University |
Sencun Zhu |
The Pennsylvania State University |
Seung Geol Choi |
US Naval Acadeamy |
Sherman S. M. Chow |
Chinese University of Hong Kong, Hong Kong |
Shiqing Ma |
Rutgers University |
Shuai Wang |
HKUST |
Stefan Katzenbeisser |
University of Passau |
Sungwook Kim |
Seoul Women's University |
Sushmita Ruj |
Indian Statistical Institute, Kolkata |
Taegyu Kim |
Pennsylvania State University |
Tatsuya Mori |
Waseda University |
Tianhao Wang |
Carnegie Mellon University and University of Virginia |
Tianwei Zhang |
Nanyang Technological University |
Ting Yu |
Qatar Computing Research Institute |
Veelasha Moonsamy |
Ruhr University Bochum |
Wei Meng |
The Chinese University of Hong Kong |
William Enck |
North Carolina State University |
Willy Susilo |
University of Wollongong |
Xiapu Luo |
The Hong Kong Polytechnic University |
Xingliang YUAN |
Monash University |
Xuhua Ding chair |
Singapore Management University |
Yajin Zhou |
Zhejiang University |
Yan Chen |
Northwestern University |
Yang Liu |
Nanyang Technological University |
Yang Zhang |
CISPA Helmholtz Center for Information Security |
Yousra Aafer |
University of Waterloo |
Yuan Zhang |
Fudan University |
Yue Duan |
Illinois Institute of Technology |
Yueqiang Cheng |
NIO Security Research |
Yuhong Nan |
Sun Yat-sen University |
Yusuke Sakai |
National Institute of Advanced Industrial Science and Technology |
Zekeriya Erkin |
Delft University of Technology |
Zhou Li |
University of California, Irvine |