Get my own profile
Public access
View all23 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Min ChenVrije Universiteit AmsterdamVerified email at vu.nl
- Tianhao WangUniversity of VirginiaVerified email at virginia.edu
- Shibo HeProfessor, College of Control Science and Engineering, Zhejiang universityVerified email at zju.edu.cn
- JIMING CHENProfessor at Zhejiang UniversityVerified email at ieee.org
- Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
- Peng ChengProfessor, Zhejiang UniversityVerified email at zju.edu.cn
- Yun ShenNetAppVerified email at netapp.com
- Mathias HumbertUniversity of LausanneVerified email at unil.ch
- Yunjun GaoProfessor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
- Shouling JiProfessor, Zhejiang University & Georgia Institute of TechnologyVerified email at gatech.edu
- Junshan ZhangElectrical and Computer Engineering, UC Davis (Google Scholar not updated since 2020)Verified email at ucdavis.edu
- John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
- Anupam DattaSnowflake AI Research, Ex-Professor CMUVerified email at snowflake.com
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu