Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Luyi XingAssociate Professor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
Xiaolong BaiAlibaba GroupVerified email at mails.tsinghua.edu.cn
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
Xiaojing LiaoIndiana University BloomingtonVerified email at indiana.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Tongxin LiPeking UniversityVerified email at pku.edu.cn
Heng YinProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
Yue DuanSingapore Management UniversityVerified email at smu.edu.sg
Xiaorui PanIndiana UniversityVerified email at indiana.edu
Aleksandra KorolovaAssistant Professor of Computer Science and Public Affairs, Princeton UniversityVerified email at princeton.edu
Jun TangPh.D. student at University of Southern CaliforniaVerified email at usc.edu
Yuqiong SunFacebook, Applied Privacy TechnologiesVerified email at fb.com
Susanta NandaServiceNow Inc.Verified email at servicenow.com
Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Shiqing MaUniversity of Massachusetts, AmherstVerified email at umass.edu
Jianjun HuangSchool of Information, Renmin University of ChinaVerified email at ruc.edu.cn
Wei YouRenmin University of ChinaVerified email at ruc.edu.cn
Peng WangIndiana University BloomingtonVerified email at indiana.edu
Kun SunGeorge Mason UniversityVerified email at gmu.edu
Mu ZhangAssistant Professor, School of Computing, University of UtahVerified email at cs.utah.edu