Get my own profile
Public access
View all47 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jinyuan JiaAssistant Professor, Penn StateVerified email at psu.edu
Xiaoyu CaoPhD. Duke UniversityVerified email at duke.edu
Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Minghong FangDuke UniversityVerified email at duke.edu
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Hongbin LiuPh.D. student, Duke UniversityVerified email at duke.edu
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yinzhi CaoJohns Hopkins UniversityVerified email at jhu.edu
Peng GaoAssistant Professor, Department of Computer Science, Virginia TechVerified email at vt.edu
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Jinghuai ZhangUCLA, ECEVerified email at g.ucla.edu
Zhengyuan JiangDuke UniversityVerified email at duke.edu
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu