Get my own profile
Public access
View all26 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Binbin ChenSingapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Wei-Peng ChenFujitsu Research of AmericaVerified email at fujitsu.com
Ulrich HerbergSr. Director of Engineering at eBayVerified email at herberg.name
Mustaque AhamadGeorgia Institute of TechnologyVerified email at cc.gatech.edu
Alvaro A. CardenasProfessor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Jorjeta JetchevaSan Jose State UniversityVerified email at sjsu.edu
Chang XuOracleVerified email at oracle.com
Stephen KobourovProfessor of Computer Science, Technical University MunichVerified email at tum.de
Yifan HuNortheastern UniversityVerified email at ccs.neu.edu
Yongdong WuVerified email at i2r.a-star.edu.sg
Apurva MohanSr. Engineering Manager - Digital Security, SchlumbergerVerified email at slb.com
Guoliang XingThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Doug BloughProfessor of Electrical and Computer Engineering, and of Computer Science, Georgia TechVerified email at ece.gatech.edu
Rakesh B BobbaOregon State UniversityVerified email at oregonstate.edu
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Robin BerthierUniversity of IllinoisVerified email at illinois.edu
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Arnab RoyResearch Scientist, Mysten LabsVerified email at cs.stanford.edu
Biplab SikdarProfessor, National University of SingaporeVerified email at nus.edu.sg
Sanam Mirzazad BarijoughMember of Research Staff, Fujitsu Labs of AmericaVerified email at us.fujitsu.com