Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
Yuekang LiLecturer (Assistant Professor), University of New South WalesVerified email at unsw.edu.au
Hongxu ChenHuawei Technologies Co. LtdVerified email at huawei.com
Yinxing XueResearch Professor (Pre-Tenure), University of Science and Technology of ChinaVerified email at ustc.edu.cn
Shengjian (Daniel) GuoApplied Scientist, AWS Proactive SecurityVerified email at amazon.com
Muhui JiangPh.D. Candidate, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Qiang LiuEPFLVerified email at epfl.ch
Xingwei LinSenior Security Engineer, Ant GroupVerified email at antgroup.com
Yajin ZhouZhejiang UniversityVerified email at zju.edu.cn
Yeting LiInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Follow
Cen Zhang
Research Fellow of Nanyang Technological University
Verified email at e.ntu.edu.sg - Homepage