Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Tao WeiVice President, Ant FinancialVerified email at antfin.com
Hui XueUniversity of Illinois at Urbana ChampaignVerified email at uiuc.edu
Yu DingGoogle DeepMindVerified email at google.com
Chuangang RenGoogleVerified email at google.com
Min ZhengThe Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
Zhaofeng ChenSecurity ResearcherVerified email at pku.edu.cn
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Chao ZhangTsinghua UniversityVerified email at tsinghua.edu.cn
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Alex Hai WangApple, Hitachi, Verisign, Penn StateVerified email at apple.com
Chuang QianPh.D., EECS, UC BerkeleyVerified email at berkeley.edu
Haiyang MaoInstitute of Microelectronics of Chinese Academy of SciencesVerified email at ime.ac.cn