Program Committee

  • Aanjhan Ranganathan, Northeastern University
  • Abdullah Aydeger, Florida Institute of Technology
  • Adrian Dabrowski, CISPA Helmholtz Center for Information Security
  • Alexandra Dmitrienko, Julius-Maximilians-Universität Würzburg
  • Altaf Shaik, TU berlin
  • Bogdan Carbunar, FIU
  • Brad Reaves, North Carolina State University
  • Christina Pöpper, NYU Abu Dhabi
  • Claudio Soriente, NEC Laboratories Europe GmbH
  • Daiki Miyahara, The University of Electro-Communications
  • Danfeng (Daphne) Yao, Virginia Tech
  • Daniele Antonioli, EURECOM
  • Dave Singelee, KU Leuven
  • Devashish Gosain, BITS Pilani Goa
  • Erik Tews, University of Twente
  • Euijin Choo, University of Alberta
  • Fareena Saqib, University of North Carolina at Charlotte
  • Farinaz Koushanfar, University of California San Diego (Chair)
  • Gerhard Hancke, City University of Hong Kong
  • Giovanni Camurati, ETH Zurich
  • Guevara Noubir, Northeastern University
  • Habiba Farrukh, University of California, Irvine
  • Haofan Cai, University of Hawaii at Manoa
  • Hyoungshick Kim, Sungkyunkwan University
  • Ivan Martinovic, University of Oxford
  • Jiska Classen, Hasso Plattner Institute
  • Jorge Guajardo, Robert Bosch LLC - Research and Technology Center
  • Jun Han, Yonsei University
  • Kari Kostiainen, ETH Zurich
  • Kasper Rasmussen, University of Oxford (Chair)
  • Katharina Kohls, Radboud University
  • Kerstin Lemke-Rust, Bonn-Rhein-Sieg University of Applied Sciences
  • Kevin Butler, University of Florida
  • Lejla Batina, Radboud University
  • Liuwan Zhu, University of Hawaii at Manoa
  • Loukas Lazos, University of Arizona
  • Lucas Davi, University of Duisburg-Essen
  • Marcel Busch, EPFL
  • Martin Henze, RWTH Aachen University / Fraunhofer FKIE
  • Martin Serror, Fraunhofer FKIE
  • Mathieu Cunche, INSA-Lyon / Inria
  • Matthias Hollick, Technical University of Darmstadt
  • Matthias Schunter, Intel Labs Europe
  • Mauro Conti, University of Padua & TU Delft
  • Michael Roland, Johannes Kepler University Linz, Austria
  • Min Suk Kang, KAIST
  • Mridula Singh, CISPA Helmholtz Center for Information Security
  • Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
  • Nirnimesh Ghose, University of Nebraska - Lincoln
  • Omar Chowdhury, Stony Brook University
  • Panos Papadimitratos, KTH Royal Institute of Technology
  • Piyush Kumar, University of Michigan
  • Ravishankar Borgaonkar, Sintef AS & University of Stavanger Norway
  • Roger Piqueras Jover, Google
  • Sayon Duttagupta, KU Leuven
  • Sazzadur Rahaman, University of Arizona
  • Sebastian Köhler, University of Oxford
  • Sneha Sudhakaran, Assistant Professor
  • Srdjan Capkun, ETH Zurich
  • Stjepan Picek, Radboud University, The Netherlands
  • Sunil Manandhar, IBM Research
  • Syed Rafiul Hussain, Pennsylvania State University
  • TJ OConnor, Florida Tech
  • Weitao Xu, City University of Hong Kong
  • Wenjing Lou, Virginia Polytechnic Institute and State University
  • Yanjun Pan, University of Arkansas
  • Yao Zheng, University of Hawaii at Manoa
  • Yingying Chen, Rutgers University
  • Yongdae Kim, KAIST
  • Z. Berkay Celik, Purdue University
  • Zhe Wang, Institute of Computing Technology, CAS