Get my own profile
Public access
View all56 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jinyuan JiaAssistant Professor, Penn StateVerified email at psu.edu
Xiaoyu CaoPhD. Duke UniversityVerified email at duke.edu
Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
Minghong FangDuke UniversityVerified email at duke.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Hongbin LiuPh.D. student, Duke UniversityVerified email at duke.edu
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Yupei LiuDuke UniversityVerified email at duke.edu
Yinzhi CaoJohns Hopkins UniversityVerified email at jhu.edu
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Zhengyuan JiangDuke UniversityVerified email at duke.edu
Jinghuai ZhangUCLA, ECEVerified email at g.ucla.edu
Peng GaoAssistant Professor, Department of Computer Science, Virginia TechVerified email at vt.edu
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
Mihai ChristodorescuGoogleVerified email at christodorescu.org