Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Peixin ZhangSingapore Management UniversityVerified email at zju.edu.cn
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Peng ChengProfessor, Zhejiang UniversityVerified email at zju.edu.cn
Xingjun MaSchool of Computer Science, Fudan UniversityVerified email at unimelb.edu.au
Youcheng SunLecturer, University of ManchesterVerified email at manchester.ac.uk
Jialuo ChenZhejiang UniversityVerified email at zju.edu.cn
Shouling JiProfessor, Zhejiang University & Georgia Institute of TechnologyVerified email at gatech.edu
Shengchao QinProfessor of Computer Science, Teesside UniversityVerified email at tees.ac.uk
Christopher M. PoskittSingapore Management University (SMU)Verified email at smu.edu.sg
Yuqi ChenAssistant Professor, Shanghaitech UniversityVerified email at shanghaitech.edu.cn
Bo LiUniversity of Illinois at Urbana–ChampaignVerified email at illinois.edu
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Pengfei YangInstitute of Software, Chinese Academy of SciencesVerified email at ios.ac.cn
Meng SunProfessor, School of Mathematical Science, Peking UniversityVerified email at math.pku.edu.cn
Fu SONGState Key Laboratory of Computer Science, Institute of Software, Chinese Academy of SciencesVerified email at ios.ac.cn
ZHANG MengdiSingapore Management UniversityVerified email at phdcs.smu.edu.sg
Xingwei LinSenior Security Engineer, Ant GroupVerified email at antgroup.com
Jie ShiSecurity Expert in Huawei Singapore Research CentreVerified email at huawei.com
Lijun ZhangFull Professor, State Key Laboratory of Computer Science, Institute of Software ChineseVerified email at ios.ac.cn