Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David EvansUniversity of Virginia, Computer ScienceVerified email at virginia.edu
Yuan TianAssociate Professor, University of California, Los AngelesVerified email at ucla.edu
Anshuman SuriPostdoctoral scholar, Northeastern UniversityVerified email at virginia.edu
Saeed MahloujifarFAIR, MetaVerified email at meta.com
Jianfeng ChiResearch Scientist, GenAI at MetaVerified email at meta.com
Jundong LiAssistant Professor, University of VirginiaVerified email at virginia.edu
Minnan LuoProfessor, Xi'an Jiaotong UniversityVerified email at xjtu.edu.cn
Jihong WangXi'an Jiaotong UniversityVerified email at stu.xjtu.edu.cn
Zijiang YangProfessor of Computer Science, Western Michigan UniversityVerified email at wmich.edu
Yulong TianNanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
Mingming ZhaIndiana University, BloomingtonVerified email at iu.edu
Nan ZhangFacebook Inc.Verified email at indiana.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
Yi ChenAssistant Professor, The University of Hong KongVerified email at hku.hk
Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.edu
Dandan XuNanjing University of Science and TechnologyVerified email at njust.edu.cn
Paolo PapottiAssociate Professor at EURECOMVerified email at eurecom.fr
Tingwei ZhangPhD student, Cornell UniversityVerified email at cornell.edu
Xiao ZhangCISPA Helmholtz Center for Information SecurityVerified email at cispa.de