Get my own profile
Public access
View all30 articles
8 articles
available
not available
Based on funding mandates
Co-authors
- Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
- Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
- Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
- Ruofan LiuPhD Candidate in National University of SingaporeVerified email at u.nus.edu
- Peng XinProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Zhenchang XingSenior Principal Research Scientist, CSIRO's Data61 & Australian National UniversityVerified email at csiro.au
- Yan XiaoSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
- Xianglin YangNational University of SingaporeVerified email at u.nus.edu
- Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
- David S. RosenblumGeorge Mason UniversityVerified email at alumni.stanford.edu
- Hong MeiPeking UniversityVerified email at pku.edu.cn
- Danny DigAssociate Professor, CS, University of ColoradoVerified email at colorado.edu
- Yuanfang CaiProfessor of Computer Science, Drexel UniversityVerified email at cs.drexel.edu
- Gordon FraserProfessor of Computer Science, University of PassauVerified email at uni-passau.de
- Zijiang YangProfessor of Computer Science, Western Michigan UniversityVerified email at wmich.edu
- 刘烃; Ting Liu西安交通大学; Xi'an Jiaotong UniversityVerified email at mail.xjtu.edu.cn
- Jianjun ZhaoKyushu UniversityVerified email at ait.kyushu-u.ac.jp
- Chenyan LiuNational University of SingaporeVerified email at u.nus.edu
- Xiwen TeohResearch Assistant, National University of SingaporeVerified email at nus.edu.sg
Follow
Yun Lin
Associate Professor, Shanghai Jiao Tong University
Verified email at cs.sjtu.edu.cn - Homepage