Get my own profile
Public access
View all38 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jinyuan JiaPh.D. student, Duke UniversityVerified email at duke.edu
Binghui WangAssistant Professor, Illinois Institute of TechnologyVerified email at iit.edu
Xiaoyu CaoPhD. Duke UniversityVerified email at duke.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Bin LiuWest Virginia UniversityVerified email at mail.wvu.edu
Hongxia JinSamsung Research AmericaVerified email at acm.org
Ameet TalwalkarCMU and Determined AIVerified email at cmu.edu
Lester MackeyMicrosoft ResearchVerified email at microsoft.com
Guang-zhong SunUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
Hongbin LiuPh.D. student, Duke UniversityVerified email at duke.edu
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Arvind NarayananAssociate Professor, Princeton UniversityVerified email at cs.princeton.edu
Hui Xiong, Fellow of AAAS and IEEEDistinguished Professor, Rutgers UniversityVerified email at rutgers.edu
Shouling JiZhejiang University & Georgia Institute of TechnologyVerified email at gatech.edu
Raheem BeyahDean and Southern Company Chair, Georgia Tech College of EngineeringVerified email at ece.gatech.edu
Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
Vyas SekarTan Family Chair in Electrical and Computer Engineering, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu