Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Quanquan GuAssociate Professor of Computer Science, UCLAVerified email at cs.ucla.edu
Lingxiao WangToyota Technological Institute at ChicagoVerified email at ttic.edu
David EvansUniversity of Virginia, Computer ScienceVerified email at virginia.edu
Yaodong YuUniversity of California, BerkeleyVerified email at berkeley.edu
Jinghui ChenAssistant Professor of Information Sciences and Technology, Penn State UniversityVerified email at psu.edu
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
YIRAN WUPhD Student, Pennsylvania State UniversityVerified email at psu.edu
Qingyun WuThe Pennsylvania State UniversityVerified email at psu.edu
Huazheng WangAssistant Professor, Oregon State UniversityVerified email at oregonstate.edu
Yifan ZengPhD Student, Oregon State UniversityVerified email at oregonstate.edu
Simon Shaolei DuAssistant Professor, School of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
Sicheng ZhuUniversity of Maryland, College ParkVerified email at umd.edu
Saeed MahloujifarFAIR, MetaVerified email at meta.com
Mohammad MahmoodyAssociate Professor, University of VirginiaVerified email at virginia.edu
Wenbo JiangUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Fnu SuyaUniversity of Tennessee, KnoxvilleVerified email at virginia.edu
Yuan TianAssociate Professor, University of California, Los AngelesVerified email at ucla.edu
Minxing ZhangCISPA – Helmholtz Center for Information SecurityVerified email at cispa.de
Hongwei LiIEEE Fellow, University of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Prof Shui YuFIEEE, BoG of IEEE ComSoc , School of Computer Science, University of Technology SydneyVerified email at uts.edu.au