Get my own profile
Public access
View all13 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Tielei WangGeorgia TechVerified email at gatech.edu
Yulong ZhangGoogleVerified email at google.com
Chao ZhangTsinghua UniversityVerified email at tsinghua.edu.cn
Jian MaoBeihang UniversityVerified email at buaa.edu.cn
Lei DuanPeking UniversityVerified email at google.com
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Zhaofeng ChenSecurity ResearcherVerified email at pku.edu.cn
László SzekeresResearch Scientist, GoogleVerified email at google.com
Yu DingGoogleVerified email at google.com
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Hui XueUniversity of Illinois at Urbana ChampaignVerified email at uiuc.edu
Stephen McCamantAssociate Professor, University of MinnesotaVerified email at cs.umn.edu
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
Zhiqiang LinDistinguished Professor of Engineering, The Ohio State UniversityVerified email at cse.ohio-state.edu
Pei WangGoogleVerified email at google.com
Zhi WangFlorida State UniversityVerified email at cs.fsu.edu
Mingshen SunIntelVerified email at mssun.me
Yue ChenPalo Alto NetworksVerified email at paloaltonetworks.com
Chuangang RenGoogleVerified email at google.com