Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sunghun KimAssociate Professor of Computer Science, The Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Yepang LiuAssistant Professor, CSE, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Yingnong DangMicrosoftVerified email at microsoft.com
Tao XiePeking University Chair Professor, School of Computer Science, Peking UniversityVerified email at pku.edu.cn
Dongmei ZhangMicrosoft ResearchVerified email at microsoft.com
Dongsun KimKyungpook National UniversityVerified email at knu.ac.kr
Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de
Shengchao QinProfessor of Computer Science, Teesside UniversityVerified email at tees.ac.uk
Zhiwu XuCollege of Computer Science and Software Engineering (CSSE), Shenzhen UniversityVerified email at szu.edu.cn
Chang XuProfessor of Computer Science and Technology, Nanjing UniversityVerified email at nju.edu.cn
DongGyun HanRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Ming WenAssociate Professor, Huazhong University of Science and TechnologyVerified email at hust.edu.cn
Hengcheng ZhuThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk