Get my own profile
Public access
View all41 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jinyuan JiaPostdoc, UIUCVerified email at duke.edu
Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
Xiaoyu CaoPhD. Duke UniversityVerified email at duke.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Minghong FangDuke UniversityVerified email at duke.edu
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Bin LiuWest Virginia UniversityVerified email at mail.wvu.edu
Hongbin LiuPh.D. student, Duke UniversityVerified email at duke.edu
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Arvind NarayananAssociate Professor, Princeton UniversityVerified email at cs.princeton.edu
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Ameet TalwalkarCMUVerified email at cmu.edu
Yinzhi CaoJohns Hopkins UniversityVerified email at jhu.edu
Vyas SekarTan Family Chair in Electrical and Computer Engineering, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Wenjie QuHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Peng GaoAssistant Professor, Department of Computer Science, Virginia TechVerified email at vt.edu
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Xing Xie 谢幸Senior Principal Research Manager, Microsoft, CCF Fellow, IEEE Fellow, ACM Distinguished MemberVerified email at microsoft.com
Xinlei HeCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yiran ChenProfessor, Electrical and Computer Engineering, Duke UniversityVerified email at duke.edu