Get my own profile
Public access
View all24 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Haojin ZhuFIEEE, Distinguished Professor, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
- Xuemin (Sherman) ShenUniversity Professor, University of WaterlooVerified email at uwaterloo.ca
- Jiachun LiShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Yao LiuProfessor of Computer Science, University of South FloridaVerified email at cse.usf.edu
- Xiaokuan ZhangAssistant Professor, Computer Science, George Mason UniversityVerified email at gmu.edu
- Lichuan MaXidian UniversityVerified email at xidian.edu.cn
- Shaofeng LiSoutheast UniversityVerified email at seu.edu.cn
- Qingqi PeiXidian UniversityVerified email at mail.xidian.edu.cn
- Yuxia ZhanShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Yugeng LiuPh.D. Candidate, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Mengyuan LiUniversity of Southern CaliforniaVerified email at usc.edu
- Yuan TianAssociate Professor, University of California, Los AngelesVerified email at ucla.edu
Follow
Yan Meng
Computer Science & Engineering Department, Shanghai Jiao Tong University
Verified email at sjtu.edu.cn - Homepage