Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- weiming zhangUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
- Nenghai YuUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
- Han FangNational University of SingaporeVerified email at nus.edu.sg
- Rahmadi TrimanandaComcast Cyber Security ResearchVerified email at comcast.com
- Athina MarkopoulouProfessor, EECS, UC IrvineVerified email at uci.edu
- Hang ZhouSimon Fraser University, CanadaVerified email at sfu.ca
- Dongdong ChenPrincipal Research Manager, GenAI, MicrosoftVerified email at mail.ustc.edu.cn
- Zhou WenboUniversity of Science and Technology of ChinaVerified email at mail.ustc.edu.cn
- Jie ZhangNanyang Technological University << University of Science and Technology of ChinaVerified email at ntu.edu.sg
- Franziska RoesnerAssociate Professor, Paul G. Allen School of Computer Science & Engineering, Univ. of WashingtonVerified email at cs.washington.edu
- Zubair ShafiqUniversity of California, DavisVerified email at ucdavis.edu
- Umar IqbalAssistant Professor, Washington University in St. LouisVerified email at wustl.edu
- Alexander Gamero-GarridoAsst. Professor of Computer Science, UC DavisVerified email at ucdavis.edu
- Daniel J. DuboisNortheastern UniversityVerified email at northeastern.edu
- Pouneh Nikkhah BahramiUniversity of California, DavisVerified email at ucdavis.edu
- David ChoffnesAssociate Professor, Northeastern UniversityVerified email at ccs.neu.edu
- Zehua MaUniversity of Science and Technology of ChinaVerified email at mail.ustc.edu.cn
- Hieu Van LePostdoctoral Research Fellow, University of MichiganVerified email at uci.edu
- Anastasia ShubaDuckDuckGo/Independent ResearcherVerified email at uci.edu
- Janus VarmarkenJuniper NetworksVerified email at juniper.net