Get my own profile
Public access
View all15 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Zhi Zhang (张智)Data61, CSIROVerified email at data61.csiro.au
Tao WeiVice President, Ant FinancialVerified email at antfin.com
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Miao YuCyLab, Carnegie Mellon UniversityVerified email at cmu.edu
Yinqian ZhangProfessor, Southern University of Science and TechnologyVerified email at acm.org
Zhi WangFlorida State UniversityVerified email at cs.fsu.edu
Zhe Wang (王喆)Institute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Zongwei ZhouSoftware Engineer at Google (Ph.D. from Carnegie Mellon University)Verified email at andrew.cmu.edu
Yu DingGoogleVerified email at google.com
Shengjian (Daniel) GuoSenior Security Scientist@Baidu Research InstituteVerified email at baidu.com
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Mustakimur Rahman KhandakerAssistant Professor, University of GeorgiaVerified email at uga.edu
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Yueqi ChenThe Pennsylvania State UniversityVerified email at ist.psu.edu
Lei ZhaoSchool of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
Liang GuYale UniversityVerified email at yale.edu
Yao Guo (郭耀)Professor of Computer Science, Peking UniversityVerified email at pku.edu.cn
Yulong ZhangGoogleVerified email at google.com