Get my own profile
Public access
View all34 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Tok Wang LingProfessor of Computer Science, National University of SingaporeVerified email at comp.nus.edu.sg
BAO ZHIFENGSchool of Computing Technologies, RMIT University; The University of MelbourneVerified email at rmit.edu.au
Gao CongNanyang Technological UniversityVerified email at ntu.edu.sg
Xiaofeng MengProfessor, Renmin University of ChinaVerified email at ruc.edu.cn
Chee Yong ChanNational University of SingaporeVerified email at comp.nus.edu.sg
Huayu WuVerified email at i2r.a-star.edu.sg
Xiaokui XiaoNational University of SingaporeVerified email at nus.edu.sg
Shengyue JiGoogleVerified email at google.com
Xuan ZhouProfessor, East China Normal UniversityVerified email at dase.ecnu.edu.cn
Xiaofang ZhouHong Kong University of Science and TechnologyVerified email at cse.ust.hk
Dan LinAssociate Professor, Director of I-Privacy Lab, University of MissouriVerified email at missouri.edu
Zhongyuan WangFacebookVerified email at fb.com
Cyrus ShahabiProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
Bogdan CautisUniversity of Paris-Sud 11Verified email at u-psud.fr
Juwei ShiMicrosoft STCVerified email at microsoft.com
Yongluan ZhouProfessor of Computer Science, University of CopenhagenVerified email at di.ku.dk
Christian S. JensenAalborg University, Department of Computer ScienceVerified email at cs.aau.dk
Pierre SenellartProfessor of Computer Science, École normale supérieureVerified email at ens.fr
M. Tamer ÖzsuUniversity Professor, University of WaterlooVerified email at uwaterloo.ca
Wei WangProfessor, Hong Kong University of Science and Technology (Guangzhou), ChinaVerified email at ust.hk
Follow