Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
Yinxing XueResearch Professor (Pre-Tenure), University of Science and Technology of ChinaVerified email at ustc.edu.cn
Zhenchang XingSenior Principal Research Scientist, CSIRO's Data61 & Australian National UniversityVerified email at csiro.au
Ruofan LiuPhD Candidate in National University of SingaporeVerified email at u.nus.edu
Peng XinProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Yan XiaoNational University of SingaporeVerified email at nus.edu.sg
Danny DigAssociate Professor, CS, University of ColoradoVerified email at colorado.edu
Yuanfang CaiProfessor of Computer Science, Drexel UniversityVerified email at cs.drexel.edu
Xianglin YangNational University of SingaporeVerified email at u.nus.edu
Ivan BeschastnikhUniversity of British ColumbiaVerified email at cs.ubc.ca
David S. RosenblumGeorge Mason UniversityVerified email at alumni.stanford.edu
Gordon FraserProfessor of Computer Science, University of PassauVerified email at uni-passau.de
刘烃; Ting Liu西安交通大学; Xi'an Jiaotong UniversityVerified email at mail.xjtu.edu.cn
Zijiang YangProfessor of Computer Science, Western Michigan UniversityVerified email at wmich.edu
Hong MeiPeking UniversityVerified email at pku.edu.cn
Jianjun ZhaoKyushu UniversityVerified email at ait.kyushu-u.ac.jp
Follow
Yun Lin
Associate Professor, Shanghai Jiao Tong University
Verified email at cs.sjtu.edu.cn - Homepage