Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Xiaolong BaiAlibaba GroupVerified email at mails.tsinghua.edu.cn
- Luyi XingAssistant Professor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
- Xiaojing LiaoIndiana University BloomingtonVerified email at indiana.edu
- Tongxin LiPeking UniversityVerified email at pku.edu.cn
- Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Heng YinProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
- Yue DuanSingapore Management UniversityVerified email at smu.edu.sg
- Xiaorui PanIndiana UniversityVerified email at indiana.edu
- Aleksandra KorolovaAssistant Professor of Computer Science and Public Affairs, Princeton UniversityVerified email at princeton.edu
- Jun TangPh.D. student at University of Southern CaliforniaVerified email at usc.edu
- Yuqiong SunFacebook, Applied Privacy TechnologiesVerified email at fb.com
- Susanta NandaSymantec Research LabsVerified email at symantec.com
- Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
- Shiqing MaUniversity of Massachusetts, AmherstVerified email at umass.edu
- Peng WangIndiana University BloomingtonVerified email at indiana.edu
- Jianjun HuangSchool of Information, Renmin University of ChinaVerified email at ruc.edu.cn
- Wei YouRenmin University of ChinaVerified email at ruc.edu.cn
- Kun SunGeorge Mason UniversityVerified email at gmu.edu
- Mu ZhangAssistant Professor, School of Computing, University of UtahVerified email at cs.utah.edu