Get my own profile
Public access
View all53 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Zhou LiAssistant Professor, University of California, IrvineVerified email at uci.edu
Shuang HaoAssistant Professor, University of Texas at DallasVerified email at utdallas.edu
Chaoyi LuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Min Yang (杨珉)Professor, School of Computer Science and Technology, Fudan UniversityVerified email at fudan.edu.cn
Xing LiTsinghua UniversityVerified email at cernet.edu.cn
Tao WanDistinguished Technologist at CableLabs & Adjunct Professor at Carleton UniversityVerified email at cablelabs.com
Jianjun ChenTsinghua UniversityVerified email at tsinghua.edu.cn
Kang LiBaidu; University of GeorgiaVerified email at cs.uga.edu
Jianwei ZhugeAssociate Professor, Tsinghua UniversityVerified email at cernet.edu.cn
Kun DuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Yuan ZhangAssociate Professor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Vern PaxsonProfessor, EECS, University of California, BerkeleyVerified email at berkeley.edu
Vinod YegneswaranPrincipal Computer Scientist, SRI InternationalVerified email at csl.sri.com
Nicholas WeaverInternational Computer Science InstituteVerified email at berkeley.edu
Yan ChenNorthwestern UniversityVerified email at northwestern.edu
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
Sumayah AlrwaisAssistant Professor at King Saud University, Saudi ArabiaVerified email at ksu.edu.sa
Hanghang TongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Jingrui HeUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Jian JiangResearch Scientist, Shape Security