Get my own profile
Public access
View all24 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Binbin ChenSingapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Wei-Peng ChenFujitsu Research of AmericaVerified email at fujitsu.com
Ulrich HerbergDistinguished Engineer at eBayVerified email at herberg.name
Mustaque AhamadGeorgia Institute of TechnologyVerified email at cc.gatech.edu
Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Jorjeta JetchevaSan Jose State UniversityVerified email at sjsu.edu
Chang XuOracleVerified email at oracle.com
Stephen KobourovProfessor of Computer Science, University of ArizonaVerified email at cs.arizona.edu
Yifan HuNortheastern UniversityVerified email at ccs.neu.edu
Yongdong WuVerified email at i2r.a-star.edu.sg
Apurva MohanSr. Engineering Manager - Digital Security, SchlumbergerVerified email at slb.com
Doug BloughProfessor of Electrical and Computer Engineering, and of Computer Science, Georgia TechVerified email at ece.gatech.edu
Guoliang XingThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Rakesh B BobbaOregon State UniversityVerified email at oregonstate.edu
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Robin BerthierUniversity of IllinoisVerified email at illinois.edu
Arnab RoyResearch Scientist, Mysten LabsVerified email at cs.stanford.edu
Biplab SikdarProfessor, National University of SingaporeVerified email at nus.edu.sg
Sanam Mirzazad BarijoughMember of Research Staff, Fujitsu Labs of AmericaVerified email at us.fujitsu.com