Get my own profile
Public access
View all32 articles
1 article
available
not available
Based on funding mandates
Co-authors
Lu ZhangPeking UniversityVerified email at sei.pku.edu.cn
Tao XiePeking University Chair Professor, School of Computer Science, Peking UniversityVerified email at pku.edu.cn
David LoProfessor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
Jianwei NiuProfessor of Computer Science, UTSAVerified email at utsa.edu
Rocky SlavinAssistant Professor, University of Texas at San AntonioVerified email at utsa.edu
Travis BreauxAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Foyzul HassanAssistant Professor, CIS, University of Michigan - DearbornVerified email at umich.edu
Jing JiangSchool of Computing and Information Systems, Singapore Management UniversityVerified email at smu.edu.sg
Lingming ZhangUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Jaspreet BhatiaSenior Privacy Engineer, GoogleVerified email at cs.cmu.edu
John AnvikAssociate Professor of Computer Science, University of LethbridgeVerified email at uleth.ca
Hong ChengProfessor, The Chinese University of Hong KongVerified email at se.cuhk.edu.hk
Chengnian SunAssistant Professor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Yingfei XiongAssociate Professor, Peking UniversityVerified email at sei.pku.edu.cn
bing xieProfessor of Computer Science,Peking universityVerified email at pku.edu.cn
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Alok TongaonkarData Scientist Director, Palo Alto NetworksVerified email at acm.org
Yingnong DangMicrosoftVerified email at microsoft.com
Xifeng YanProfessor, Computer Science, Univ. of California at Santa BarbaraVerified email at cs.ucsb.edu
Yang ZhouAuburn UniversityVerified email at auburn.edu
Follow
Xiaoyin Wang
Associate Professor, University of Texas at San Antonio
Verified email at utsa.edu - Homepage