Get my own profile
Public access
View all19 articles
20 articles
available
not available
Based on funding mandates
Co-authors
- Lirong ZhengProfessor of Intelligent Systems, Fudan University & KTH-Royal Institute of TechnologyVerified email at kth.se
- Wenyuan XuProfessor, IEEE Fellow, Zhejiang University, College of EEVerified email at zju.edu.cn
- X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Zheran FangFudan UniversityVerified email at fudan.edu.cn
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Zhibo PangABB Corporate Research, and KTH Royal Institute of Technology, SwedenVerified email at kth.se
- Qun NiSoftware Engineer, Google IncVerified email at google.com
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
- Shuguang Li/李曙光Professor,China University of Geosciences (Beijing); University of Science and Technology of ChinaVerified email at cugb.edu.cn
- Xin WangProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Hao ChenProfessor of Computer Science. IEEE FellowVerified email at ucdavis.edu
- Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- Xinyi ZhangFacebookVerified email at cs.ucsb.edu
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Jianwei YinProfessor of Computer Science and Technology, Zhejiang UniversityVerified email at zju.edu.cn
- Chenguang ShenFacebookVerified email at ucla.edu
- Gang Pan (潘纲)Professor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
- Hossen Asiful Mustafa, PhDBangladesh University of Engineering and Technology (BUET)Verified email at iict.buet.ac.bd
- Guofu LiUniversity of Shanghai for Science and TechnologyVerified email at usst.edu.cn