Get my own profile
Public access
View all21 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Zhi Zhang (张智)The University of Western AustraliaVerified email at uwa.edu.au
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Tao WeiVice President, Ant FinancialVerified email at antfin.com
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Yinqian ZhangProfessor, Southern University of Science and TechnologyVerified email at acm.org
Miao YuCyLab, Carnegie Mellon UniversityVerified email at cmu.edu
Zhi WangFlorida State UniversityVerified email at cs.fsu.edu
Zhe Wang (王喆)Institute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Dongxi LiuCSIROVerified email at csiro.au
Zongwei ZhouSoftware Engineer at Google (Ph.D. from Carnegie Mellon University)Verified email at andrew.cmu.edu
Shengjian (Daniel) GuoApplied Scientist, AWS Proactive SecurityVerified email at amazon.com
Lei ZhaoSchool of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
Yu DingGoogleVerified email at google.com
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Mustakimur Rahman KhandakerAssistant Professor, University of GeorgiaVerified email at uga.edu
Yueqi ChenUniversity of Colorado BoulderVerified email at colorado.edu
Li XiongSamuel Dobbs Professor, Computer Science, Biomedical Informatics, Emory UniversityVerified email at emory.edu
Xiaolan GuPhD student, University of ArizonaVerified email at email.arizona.edu
Yang CaoHokkaido UniversityVerified email at ist.hokudai.ac.jp