Get my own profile
Public access
View all59 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jonathan KatzSenior Staff Research Scientist, GoogleVerified email at cs.umd.edu
Kang YangState Key Laboratory of CryptologyVerified email at sklc.orgChenkai WengArizona State UniversityVerified email at asu.edu
Yu YuProfessor, Shanghai Jiao Tong UniversityVerified email at tsinghua.edu.cn
Qi ZhuProfessor of Computer EngineeringVerified email at northwestern.edu
Lixu WangNanyang Technological UniversityVerified email at ntu.edu.sg
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Samuel RanellucciPostdocVerified email at cs.au.dkShichao XuComputer Science Department, Northwestern University, USAVerified email at u.northwestern.edu
Yan HuangIU BloomingtonVerified email at iu.edu
Alex J. MalozemoffGaloisVerified email at galois.comKartik NayakDuke UniversityVerified email at cs.duke.edu
Xiang XiePADO LabsVerified email at padolabs.org
Vladimir KolesnikovGeorgia Institute of TechnologyVerified email at gatech.edu
Jennie RogersAssociate Professor, Northwestern UniversityVerified email at northwestern.edu
T-H. Hubert ChanDepartment of Computer Science, The University of Hong KongVerified email at cs.hku.hk
Chang LiuAlibaba DAMO AcademyVerified email at alibaba-inc.com
Chun Guo (郭淳)Shandong UniversityVerified email at sdu.edu.cnNicolas PapernotUniversity of Toronto and Vector InstituteVerified email at utoronto.ca
Pratik SarkarSupra ResearchVerified email at supra.com