Get my own profile
Public access
View all17 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Beng Chin OOINational University of SingaporeVerified email at comp.nus.edu.sg
Meihui ZHANGBeijing Institute of TechnologyVerified email at bit.edu.cn
Qian LinResearch Engineer, ByteDanceVerified email at bytedance.com
Ee-Chien ChangNational University of SingaporeVerified email at comp.nus.edu.sg
Anwitaman DattaNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Hung DangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Wei WangByteDanceVerified email at bytedance.com
Prateek SaxenaNational University of SingaporeVerified email at comp.nus.edu.sg
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Georgios TheodoropoulosSUSTech, Shenzhen, ChinaVerified email at sustech.edu.cn
CHUNWANG ZHANGSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Hao Zhang4Paradigm TechnologyVerified email at 4paradigm.com
Michael LeesAssociate Professor, University of AmsterdamVerified email at uva.nl
Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
Milind GanjooGoogleVerified email at cs.stanford.edu
Stefano BraghinIBM ResearchVerified email at ie.ibm.com
Jinyang GaoAlibaba Group