Get my own profile
Co-authors
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
Xiaoyong ZhouGoogle, IncVerified email at indiana.edu
Yuan TianAssistant Professor, University of VirginiaVerified email at virginia.edu
Xianghang MiAssistant Professor, SUNY BuffaloVerified email at buffalo.edu
Tongxin LiPeking UniversityVerified email at pku.edu.cn
Xiaolong BaiTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.edu
Soteris DemetriouAssistant Professor, Imperial College LondonVerified email at imperial.ac.uk
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Luyi XingAssistant Professor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Yu Yao (姚羽)Prof. of CS, Northeastern Univ. (东北大学的计算机科学教授)Verified email at mail.neu.edu.cn
Muhammad NaveedUniversity of Southern CaliforniaVerified email at usc.edu