Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Yuan TianAssistant Professor, University of California, Los AngelesVerified email at ucla.edu
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
Xiaoyong Zhou (周小勇)Google, IncVerified email at indiana.edu
Xianghang MiUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
Tongxin LiPeking UniversityVerified email at pku.edu.cn
Soteris DemetriouAssistant Professor, Imperial College LondonVerified email at imperial.ac.uk
Xiaolong BaiAlibaba GroupVerified email at mails.tsinghua.edu.cn
Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.edu
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Luyi XingAssistant Professor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Yu Yao (姚羽)Prof. of CS, Northeastern Univ. (东北大学的计算机科学教授)Verified email at mail.neu.edu.cn
Muhammad NaveedUniversity of Southern CaliforniaVerified email at usc.edu