Get my own profile
Public access
View all36 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Zhikun ZhangAssistant Professor, Zhejiang UniversityVerified email at zju.edu.cn
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Bolin DingAlibaba GroupVerified email at alibaba-inc.com
Graham CormodeMeta AI, University of WarwickVerified email at warwick.ac.uk
Aiping XiongThe Pennsylvania State UniversityVerified email at psu.edu
Zhou LiAssistant Professor, University of California, IrvineVerified email at uci.edu
Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
David EvansUniversity of Virginia, Computer ScienceVerified email at virginia.edu
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu