Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Nan ZhangFacebook Inc.Verified email at indiana.edu
Xiaoyong Zhou (周小勇)Google, IncVerified email at indiana.edu
Peng WangIndiana University BloomingtonVerified email at indiana.edu
Soteris DemetriouAssociate Professor, Imperial College LondonVerified email at imperial.ac.uk
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Yi ChenAssistant Professor, The University of Hong KongVerified email at hku.hk
Tongxin LiPeking UniversityVerified email at pku.edu.cnPeng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Luyi XingAssociate Professor of Computer Science, University of Illinois Urbana-Champaign/Indiana UniversityVerified email at illinois.edu
Wei YouRenmin University of ChinaVerified email at ruc.edu.cn
Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.eduHeqing HuangAffiliate exProfessor, Tiktok LLM Sec, ByteDanace AI Lab, TensorSec, IBM AI, PANW, FireEye
Muhammad NaveedUniversity of Southern CaliforniaVerified email at usc.edu
XiaoFeng WangChair, ACM SIGSAC
Follow
Yeonjoon Lee
Associate Professor of College of Computing, Hanyang University
Verified email at hanyang.ac.kr - Homepage