Get my own profile
Public access
View all32 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
- Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
- Zhikun ZhangZhejiang UniversityVerified email at zju.edu.cn
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Bolin DingAlibaba GroupVerified email at alibaba-inc.com
- Graham CormodeMeta AI, University of WarwickVerified email at warwick.ac.uk
- Aiping XiongThe Pennsylvania State UniversityVerified email at psu.edu
- Zhou LiAssistant Professor, University of California, IrvineVerified email at uci.edu
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- David EvansUniversity of Virginia, Computer ScienceVerified email at virginia.edu
- Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu