Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Tao WeiVice President, Ant FinancialVerified email at antfin.com
Hui XueUniversity of Illinois at Urbana ChampaignVerified email at uiuc.edu
Yu DingGoogleVerified email at google.com
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Chuangang RenGoogleVerified email at google.com
Min ZhengThe Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
Zhaofeng ChenSecurity ResearcherVerified email at pku.edu.cn
Chao ZhangTsinghua UniversityVerified email at tsinghua.edu.cn
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Chuang QianPh.D., EECS, UC BerkeleyVerified email at berkeley.edu
Alex Hai WangApple, Hitachi, Verisign, Penn State
Haiyang MaoInstitute of Microelectronics of Chinese Academy of SciencesVerified email at ime.ac.cn