Get my own profile
Co-authors
Haibo ChenInstitute of Parallel and Distituted Systems, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Wenhao LiShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
cheng tanNYUVerified email at cs.nyu.edu
Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Zhichuang SunNortheastern UniversityVerified email at husky.neu.edu
Nathan DautenhahnRice UniversityVerified email at rice.edu
Beng Chin OOINational University of SingaporeVerified email at comp.nus.edu.sg
Hao ZhangPhD, National University of Singapore (NUS)Verified email at comp.nus.edu.sg
Yunji Chen (陈云霁)Institute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Shoumeng YanAnt FinancialVerified email at antfin.com
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Le GuanDepartment of Computer Science at the University of GeorgiaVerified email at cs.uga.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu