Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
weiming zhangUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
Nenghai YuUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
Han FangNational University of SingaporeVerified email at nus.edu.sg
Rahmadi TrimanandaComcast Cyber Security ResearchVerified email at comcast.com
Athina MarkopoulouProfessor, EECS, UC IrvineVerified email at uci.edu
Hang ZhouSimon Fraser University, CanadaVerified email at sfu.ca
Dongdong ChenPrincipal Research Manager, GenAI, MicrosoftVerified email at mail.ustc.edu.cn
Zhou WenboUniversity of Science and Technology of ChinaVerified email at mail.ustc.edu.cn
Jie ZhangResearch Scientist, CFAR, A*STAR << NTU << USTCVerified email at cfar.a-star.edu.sg
Zehua MaUniversity of Science and Technology of ChinaVerified email at mail.ustc.edu.cn
Hieu Van LePostdoctoral Research Fellow, University of MichiganVerified email at uci.edu
Anastasia ShubaDuckDuckGo/Independent ResearcherVerified email at uci.edu
Franziska RoesnerAssociate Professor, Paul G. Allen School of Computer Science & Engineering, Univ. of WashingtonVerified email at cs.washington.edu
Zubair ShafiqUniversity of California, DavisVerified email at ucdavis.edu
Umar IqbalAssistant Professor, Washington University in St. LouisVerified email at wustl.edu
Alexander Gamero-GarridoAsst. Professor of Computer Science, UC DavisVerified email at ucdavis.edu
Daniel J. DuboisNortheastern UniversityVerified email at northeastern.edu
Pouneh Nikkhah BahramiUniversity of California, DavisVerified email at ucdavis.edu
David ChoffnesAssociate Professor, Northeastern UniversityVerified email at ccs.neu.edu
Ismat JarinPh.D. student, UCI, CS, Research Assistant, Proper Data LabVerified email at uci.edu