Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yijia ChenShanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
- Yican SunPh.D. Student, Peking UniversityVerified email at pku.edu.cn
- Édouard BonnetENS Lyon, LIP, FranceVerified email at ens-lyon.fr
- Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Ken-ichi KawarabayashiNational Institute of Informatics, The University of TokyoVerified email at nii.ac.jp
- Pasin ManurangsiGoogle ResearchVerified email at google.com
- Arnab BhattacharyyaAssociate Professor, National University of SingaporeVerified email at nus.edu.sg
- Suprovat GhoshalPostdoc at Northwestern University and TTI ChicagoVerified email at northwestern.edu
- Venkatesan GuruswamiUniversity of California, BerkeleyVerified email at berkeley.edu
- Kewen WuUC BerkeleyVerified email at berkeley.edu
- Chihao ZhangShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Martin GroheProfessor of Computer Science, RWTH Aachen UniversityVerified email at informatik.rwth-aachen.de
- Yoichi IwataNational Institute of InformaticsVerified email at nii.ac.jp
- Hiroshi ImaiDepartment of Computer Science, University of TokyoVerified email at is.s.u-tokyo.ac.jp
- Karthik C. S.Rutgers UniversityVerified email at rutgers.edu