• Haya Schulmann, Goethe-Universität Frankfurt | National Research Center for Applied Cybersecurity ATHENE, Germany
  • Ninghui Li, Purdue University, USA
  • Vijay Atluri, Rutgers University
  • Guangdong Bai, The University of Queensland
  • Sebastien Bardin, CEA LIST
  • Elisa Bertino, Purdue University
  • Clara Bertolissi, University Aix-Marseilles
  • Antonio Bianchi, Purdue University
  • Marina Blanton, University at Buffalo
  • Carlo Blundo, Università degli Studi di Salerno
  • Tamara Bonaci, Northeastern University
  • Aldar C-F. Chan, University of Hong Kong
  • Sze Yiu Chau, The Chinese University of Hong Kong
  • Bo Chen, Michigan Technological University
  • Rongmao Chen, National University of Defense Technology, China
  • Xiaofeng Chen, Xidian University
  • Yuan Cheng, Grand Valley State University
  • Haehyun Cho, Soongsil University
  • Sherman S. M. Chow, The Chinese University of Hong Kong
  • Pietro Colombo, University of Insubria
  • Mauro Conti, University of Padua
  • Bruno Crispo, University of Trento
  • Michel Cukier, University of Maryland
  • Frédéric Cuppens, Polytechnique Montreal
  • Nora Cuppens-Boulahia, Polytechnique Montréal
  • Hervé Debar, Télécom SudParis
  • Roberto Di Pietro, King Abdullah University of Science and Technology
  • Wenrui Diao, Shandong University
  • Tassos Dimitriou, Computer Technology Institute, Greece and Kuwait University, Kuwait
  • Jannik Dreier, LORIA, Université de Lorraine, INRIA, CNRS
  • Santiago Escobar, Universitat Politècnica de València
  • Birhanu Eshete, University of Michigan - Dearborn
  • Josep Lluís Ferrer Gomila, Universitat de les Illes Balears
  • Joaquin Garcia-Alfaro, Institut Polytechnique de Paris
  • Dieter Gollmann, Hamburg University of Technology
  • Stefanos Gritzalis, University of Piraeus
  • Zhongshu Gu, IBM
  • Maanak Gupta, Tennessee Tech University
  • Gregory Gutin, Royal Holloway
  • Hongxin Hu, University at Buffalo
  • Xinyi Huang, Fujian Normal University, China
  • Syed Rafiul Hussain, Pennsylvania State University
  • Martin Johns, TU Braunschweig
  • Murat Kantarcioglu, The University of Texas at Dallas
  • Sokratis Katsikas, Norwegian University of Science and Technology
  • Hyoungshick Kim, Sungkyunkwan University
  • Ram Krishnan, University of Texas at San Antonio
  • Marina Krotofil, Hamburg University of Technology
  • Kyu Hyung Lee, University of Georgia
  • Corrado Leita, VMware
  • Jun Li, University of Oregon
  • Kai Li, San Diego State University
  • Shujun Li, University of Kent
  • Zitao Li, Purdue University
  • Kaitai Liang, Delft University of Technology
  • Xiaojing Liao, Indiana University Bloomington
  • Hoon Wei Lim, Trustwave
  • Dan Lin, Vanderbilt University
  • Zhiqiang Lin, The Ohio State University
  • Xiangyu Liu, Alibaba Inc.
  • Rongxing Lu, University of New Brunswick
  • Xiapu Luo, The Hong Kong Polytechnic University
  • Shiqing Ma, University of Massachusetts, Amherst
  • Leandros Maglaras, De Montfort University
  • Fabio Martinelli, IIT-CNR
  • Sjouke Mauw, University of Luxembourg
  • Weizhi Meng, Technical University of Denmark
  • Donika Mirdita, Technische Universität Darmstadt | The National Research Center for Applied Cybersecurity ATHENE
  • Chris Mitchell, Royal Holloway, University of London
  • Sudeep Mittal, Mississippi State University
  • Siaw-Lynn Ng, Royal Holloway, University of London
  • Jianting Ning, Singapore Management University
  • Rolf Oppliger, eSECURITY Technologies
  • Muslum Ozgur Ozmen, Purdue University
  • Sikhar Patranabis, IBM Research India
  • Günther Pernul, Universität Regensburg
  • Megha Quamara, King's College London
  • Jean-Jacques Quisquater, UCL DICE/Crypto Group
  • Silvio Ranise, University of Trento and Fondazione Bruno Kessler
  • Siddharth Prakash Rao, Aalto University
  • Awais Rashid, University of Bristol
  • Indrakshi Ray, Colorado State University
  • Junghwan Rhee, University of Central Oklahoma
  • Giovanni Russello, The University of Auckland
  • Reihaneh Safavi-Naini, University of Calgary
  • Neta Schiff Rozen, Hebrew University of Jerusalem
  • Dominique Schroeder, Friedrich-Alexander-Universiät Erlangen-Nürnberg
  • Joerg Schwenk, Ruhr-Universität Bochum
  • Jean-Pierre Seifert, Samsung Electronics
  • R Sekar, Stony Brook University
  • Siamak Shahandashti, University of York
  • Wenbo Shen, Zhejiang University
  • Weidong Shi, University of Houston
  • Hervais Simo Fhom, Fraunhofer SIT | The National Research Center for Applied Cybersecurity ATHENE
  • Natalia Stakhanova, University of Saskatchewan
  • Wenhai Sun, Purdue University
  • Shamik Sural, IIT Kharagpur
  • Paul Syverson, U.S. Naval Research Laboratory
  • Qiang Tang, Luxembourg Institute of Science and Technology
  • Qiang Tang, University of Sydney
  • Dave Tian, Purdue University
  • Jacob Torrey, Amazon Web Services
  • Ari Trachtenberg, Boston University
  • Tobias Urban, Institute for Internet Security
  • Phani Vadrevu, University of New Orleans
  • Rakesh Verma, University of Houston
  • João Vilela, University of Porto
  • Di Wang, University at Buffalo
  • Haining Wang, University of Delaware
  • Lingyu Wang, Concordia University
  • Edgar Weippl, University of Vienna
  • Avishai Wool, Tel Aviv University
  • Christos Xenakis, University of Piraeus
  • Yang Xiang, Swinburne University of Technology
  • Shouhuai Xu, University of Colorado, Colorado Springs
  • Guomin Yang, Singapore Management University
  • Jie Yang, Florida State University
  • Roland Yap, National University of Singapore
  • Tuba Yavuz, University of Florida
  • Chuan Yue, Colorado School of Mines
  • Kehuan Zhang, The Chinese University of Hong Kong
  • Yang Zhang, CISPA Helmholtz Center for Information Security
  • Yuan Zhang, Fudan University
  • Zhikun Zhang, CISPA Helmholtz Center for Information Security
  • Liang Zhao, Sichuan University
  • Yunlei Zhao, Fudan University
  • Ziming Zhao, University at Buffalo
  • Jianying Zhou, Singapore University of Technology and Design
  • Rui Zhu, Indiana University
  • Sencun Zhu, The Pennsylvania State University
  • Melek Önen, EURECOM