Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
- Soteris DemetriouAssistant Professor, Imperial College LondonVerified email at imperial.ac.uk
- Nan ZhangFacebook Inc.Verified email at indiana.edu
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
- Kehuan ZhangThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- Rui WangIndiana University, Microsoft Research, AppBugs IncVerified email at indiana.edu
- Haixu TangProfessor, Indiana UniversityVerified email at indiana.edu
- Yong LiIllumina Inc.Verified email at stanford.edu
- Christopher KruegelUniversity of California, Santa Barbara and VMware, Inc.Verified email at cs.ucsb.edu
- Clemens KolbitschLastline, Inc., formerly PhD student at Vienna University of Technology, Vienna, AustriaVerified email at iseclab.org
- Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
- Paolo Milani ComparettiPostdoc at International Secure Systems LabVerified email at seclab.tuwien.ac.at
- Apu KapadiaProfessor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
- Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.edu
- Dongjing HeSoftware engineer, GoogleVerified email at google.com
- Xiaorui PanIndiana UniversityVerified email at indiana.edu
- Muhammad NaveedUniversity of Southern CaliforniaVerified email at usc.edu