Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sunghun KimAssociate Professor of Computer Science, The Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Yepang LiuAssociate Professor, CSE, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Shengchao QinProfessor of Computer Science, Teesside UniversityVerified email at tees.ac.uk
Zhiwu XuCollege of Computer Science and Software Engineering (CSSE), Shenzhen UniversityVerified email at szu.edu.cn
Yingnong DangMicrosoftVerified email at microsoft.com
Tao XiePeking University Chair Professor, Chair of Department of Software Science and Engineering@PKUVerified email at pku.edu.cn
Dongmei ZhangMicrosoft ResearchVerified email at microsoft.com
Dongsun KimKorea UniversityVerified email at korea.ac.kr
Andreas ZellerFaculty, CISPA Helmholtz Center for Information Security • Professor, Saarland UniversityVerified email at cispa.de
Ming WenAssociate Professor, Huazhong University of Science and TechnologyVerified email at hust.edu.cn
Chang XuProfessor of Computer Science and Technology, Nanjing UniversityVerified email at nju.edu.cn
DongGyun HanRoyal Holloway, University of LondonVerified email at rhul.ac.uk