Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sun JunProfessor of SCIS, SMUEmail verificata su smu.edu.sg
- Peixin ZhangSingapore Management UniversityEmail verificata su zju.edu.cn
- Jin Song DongProfessor of Computer Science, National University of SingaporeEmail verificata su nus.edu.sg
- Peng ChengProfessor, Zhejiang UniversityEmail verificata su zju.edu.cn
- Xingjun MaSchool of Computer Science, Fudan UniversityEmail verificata su unimelb.edu.au
- Youcheng SunLecturer, University of ManchesterEmail verificata su manchester.ac.uk
- Jialuo ChenZhejiang UniversityEmail verificata su zju.edu.cn
- Shouling JiProfessor, Zhejiang University & Georgia Institute of TechnologyEmail verificata su gatech.edu
- Shengchao QinProfessor of Computer Science, Teesside UniversityEmail verificata su tees.ac.uk
- Bo LiUniversity of Illinois at Urbana–ChampaignEmail verificata su illinois.edu
- Christopher M. PoskittSingapore Management University (SMU)Email verificata su smu.edu.sg
- Yuqi ChenAssistant Professor, Shanghaitech UniversityEmail verificata su shanghaitech.edu.cn
- Dawn SongProfessor of Computer Science, UC BerkeleyEmail verificata su cs.berkeley.edu
- Pengfei YangInstitute of Software, Chinese Academy of SciencesEmail verificata su ios.ac.cn
- Meng SunProfessor, School of Mathematical Science, Peking UniversityEmail verificata su math.pku.edu.cn
- Fu SONGState Key Laboratory of Computer Science, Institute of Software, Chinese Academy of SciencesEmail verificata su ios.ac.cn
- ZHANG MengdiSingapore Management UniversityEmail verificata su phdcs.smu.edu.sg
- Xingwei LinSenior Security Engineer, Ant GroupEmail verificata su antgroup.com
- Jie ShiSecurity Expert in Huawei Singapore Research CentreEmail verificata su huawei.com
- Lijun ZhangFull Professor, State Key Laboratory of Computer Science, Institute of Software ChineseEmail verificata su ios.ac.cn