Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Haojin ZhuFIEEE, Professor, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
- Jiachun LiShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Xuemin (Sherman) ShenUniversity Professor, University of WaterlooVerified email at uwaterloo.ca
- Yao LiuAssociate Professor of Computer Science, University of South FloridaVerified email at cse.usf.edu
- Xiaokuan ZhangAssistant Professor, Computer Science, George Mason UniversityVerified email at gmu.edu
- shaofeng liPeng Cheng LaboratoryVerified email at pcl.ac.cn
- Lichuan MaXidian UniversityVerified email at xidian.edu.cn
- Yugeng LiuPh.D. Candidate, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Mengyuan LiMITVerified email at osu.edu
- Yuan TianAssistant Professor, University of California, Los AngelesVerified email at ucla.edu
- Qingqi PeiXidian UniversityVerified email at mail.xidian.edu.cn
- Yuxia ZhanShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Follow
Yan Meng
Computer Science & Engineering Department, Shanghai Jiao Tong University
Verified email at sjtu.edu.cn - Homepage