Get my own profile
Public access
View all27 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Haojin ZhuFIEEE, Distinguished Professor, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Xuemin (Sherman) ShenUniversity Professor, University of WaterlooVerified email at uwaterloo.ca
Jiachun LiShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Xiaokuan ZhangAssistant Professor, Computer Science, George Mason UniversityVerified email at gmu.edu
Yao LiuProfessor of Computer Science, University of South FloridaVerified email at cse.usf.edu
Lichuan MaXidian UniversityVerified email at xidian.edu.cn
Shaofeng LiSoutheast UniversityVerified email at seu.edu.cn
Qingqi PeiXidian UniversityVerified email at mail.xidian.edu.cn
Yuxia ZhanShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Yugeng LiuPh.D. Candidate, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yuan TianAssociate Professor, University of California, Los AngelesVerified email at ucla.edu
Mengyuan LiUniversity of Southern CaliforniaVerified email at usc.edu
Follow
Yan Meng
Computer Science & Engineering Department, Shanghai Jiao Tong University
Verified email at sjtu.edu.cn - Homepage