Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
Soteris DemetriouAssociate Professor, Imperial College LondonVerified email at imperial.ac.uk
Nan ZhangFacebook Inc.Verified email at indiana.edu
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
Kehuan ZhangThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Rui WangIndiana University, Microsoft Research, AppBugs IncVerified email at indiana.edu
Haixu TangProfessor, Indiana UniversityVerified email at indiana.edu
Yong LiIllumina Inc.Verified email at stanford.edu
Christopher KruegelUniversity of California, Santa Barbara and Cisco, Inc.Verified email at cs.ucsb.edu
Clemens KolbitschLastline, Inc., formerly PhD student at Vienna University of Technology, Vienna, AustriaVerified email at iseclab.org
Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
Paolo Milani ComparettiPostdoc at International Secure Systems LabVerified email at seclab.tuwien.ac.at
Apu KapadiaProfessor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.edu
Dongjing HeSoftware engineer, GoogleVerified email at google.com
Xiaorui PanIndiana UniversityVerified email at indiana.edu
Muhammad NaveedUniversity of Southern CaliforniaVerified email at usc.edu