Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonEmail verificata su iu.edu
- Soteris DemetriouAssistant Professor, Imperial College LondonEmail verificata su imperial.ac.uk
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Nan ZhangFacebook Inc.Email verificata su indiana.edu
- Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityEmail verificata su hanyang.ac.kr
- Kehuan ZhangThe Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Rui WangIndiana University, Microsoft Research, AppBugs IncEmail verificata su indiana.edu
- Haixu TangProfessor, Indiana UniversityEmail verificata su indiana.edu
- Yong LiIllumina Inc.Email verificata su stanford.edu
- Christopher KruegelUniversity of California, Santa Barbara and VMware, Inc.Email verificata su cs.ucsb.edu
- Clemens KolbitschLastline, Inc., formerly PhD student at Vienna University of Technology, Vienna, AustriaEmail verificata su iseclab.org
- Engin KirdaNortheastern University and Lastline Inc. (co-founder)Email verificata su ccs.neu.edu
- Paolo Milani ComparettiPostdoc at International Secure Systems LabEmail verificata su seclab.tuwien.ac.at
- Apu KapadiaProfessor of Computer Science, Indiana University BloomingtonEmail verificata su indiana.edu
- Kan YuanIndiana University Computer Science DepartmentEmail verificata su indiana.edu
- Dongjing HeSoftware engineer, GoogleEmail verificata su google.com
- Xiaorui PanIndiana UniversityEmail verificata su indiana.edu
- Muhammad NaveedUniversity of Southern CaliforniaEmail verificata su usc.edu