Get my own profile
Public access
View all47 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Lu ZhangPeking UniversityVerified email at sei.pku.edu.cn
Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.edu
Tao XiePeking University Chair Professor, Chair of Department of Software Science and Engineering@PKUVerified email at pku.edu.cn
Rocky SlavinAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
David LoProfessor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
Foyzul HassanAssistant Professor, CIS, University of Michigan - DearbornVerified email at umich.edu
Jing JiangSchool of Computing, ANU; School of Computing and Information Systems, SMUVerified email at smu.edu.sg
Lingming ZhangUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Jaspreet BhatiaStaff Privacy Engineer, GoogleVerified email at cs.cmu.edu
Yingfei XiongAssociate Professor, Peking UniversityVerified email at sei.pku.edu.cn
John AnvikAssociate Professor of Computer Science, University of LethbridgeVerified email at uleth.ca
bing xieProfessor of Computer Science,Peking universityVerified email at pku.edu.cn
Hong ChengProfessor, The Chinese University of Hong KongVerified email at se.cuhk.edu.hk
Chengnian SunAssociate Professor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Hao TangPeking UniversityVerified email at sei.pku.edu.cn
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Alok TongaonkarData Scientist Director, Palo Alto NetworksVerified email at acm.org
Yingnong DangMicrosoftVerified email at microsoft.com
Xifeng YanProfessor, Computer Science, Univ. of California at Santa BarbaraVerified email at cs.ucsb.edu
Yang ZhouAuburn UniversityVerified email at auburn.edu
Follow