Get my own profile
Public access
View all18 articles
21 articles
available
not available
Based on funding mandates
Co-authors
Lirong ZhengProfessor of Intelligent Systems, Fudan University & KTH-Royal Institute of TechnologyVerified email at kth.se
Wenyuan XuProfessor, IEEE Fellow, Zhejiang University, College of EEVerified email at zju.edu.cn
X. Sean WangSchool of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Zheran FangFudan UniversityVerified email at fudan.edu.cn
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Zhibo PangABB Corporate Research, and KTH Royal Institute of Technology, SwedenVerified email at kth.se
Qun NiSoftware Engineer, Google IncVerified email at google.com
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Shuguang Li/李曙光Professor,China University of Geosciences (Beijing); University of Science and Technology of ChinaVerified email at cugb.edu.cn
Xin WangProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Xinyi ZhangFacebookVerified email at cs.ucsb.edu
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jianwei YinProfessor of Computer Science and Technology, Zhejiang UniversityVerified email at zju.edu.cn
Chenguang ShenFacebookVerified email at ucla.edu
Gang Pan (潘纲)Professor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
Hossen Asiful Mustafa, PhDBangladesh University of Engineering and Technology (BUET)Verified email at iict.buet.ac.bd
Guofu LiUniversity of Shanghai for Science and TechnologyVerified email at usst.edu.cn
Hao ChenProfessor of Computer Science. IEEE Fellow