Crea il mio profilo
Accesso pubblico
Visualizza tutto13 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xiaolong BaiAlibaba GroupEmail verificata su mails.tsinghua.edu.cn
- Luyi XingAssociate Professor of Computer Science, Indiana University BloomingtonEmail verificata su indiana.edu
- Xiaojing LiaoIndiana University BloomingtonEmail verificata su indiana.edu
- Tongxin LiPeking UniversityEmail verificata su pku.edu.cn
- Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityEmail verificata su hanyang.ac.kr
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Heng YinProfessor of Computer Science, UC RiversideEmail verificata su cs.ucr.edu
- Yue DuanSingapore Management UniversityEmail verificata su smu.edu.sg
- Xiaorui PanIndiana UniversityEmail verificata su indiana.edu
- Aleksandra KorolovaAssistant Professor of Computer Science and Public Affairs, Princeton UniversityEmail verificata su princeton.edu
- Jun TangPh.D. student at University of Southern CaliforniaEmail verificata su usc.edu
- Yuqiong SunFacebook, Applied Privacy TechnologiesEmail verificata su fb.com
- Susanta NandaSymantec Research LabsEmail verificata su symantec.com
- Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityEmail verificata su cs.purdue.edu
- Shiqing MaUniversity of Massachusetts, AmherstEmail verificata su umass.edu
- Peng WangIndiana University BloomingtonEmail verificata su indiana.edu
- Jianjun HuangSchool of Information, Renmin University of ChinaEmail verificata su ruc.edu.cn
- Wei YouRenmin University of ChinaEmail verificata su ruc.edu.cn
- Kun SunGeorge Mason UniversityEmail verificata su gmu.edu
- Mu ZhangAssistant Professor, School of Computing, University of UtahEmail verificata su cs.utah.edu