Get my own profile
Public access
View all55 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jinyuan JiaAssistant Professor, Penn StateVerified email at psu.edu
- Xiaoyu CaoPhD. Duke UniversityVerified email at duke.edu
- Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
- Minghong FangDuke UniversityVerified email at duke.edu
- Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Hongbin LiuPh.D. student, Duke UniversityVerified email at duke.edu
- Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Yinzhi CaoJohns Hopkins UniversityVerified email at jhu.edu
- Peng GaoAssistant Professor, Department of Computer Science, Virginia TechVerified email at vt.edu
- Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Zhengyuan JiangDuke UniversityVerified email at duke.edu
- Jinghuai ZhangUCLA, ECEVerified email at g.ucla.edu
- Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu