Get my own profile
Public access
View all26 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Quanquan GuAssociate Professor of Computer Science, UCLAVerified email at cs.ucla.edu
Lu LinAssistant Professor of Information Science and Technology, Penn State UniversityVerified email at psu.edu
Ting WangStony Brook UniversityVerified email at cs.stonybrook.edu
Dongruo ZhouIndiana University BloomingtonVerified email at iu.edu
Fenglong MaPennsylvania State UniversityVerified email at psu.edu
Yuan CaoThe University of Hong KongVerified email at hku.hk
Pan XuDuke UniversityVerified email at duke.edu
Difan ZouThe University of Hong KongVerified email at cs.hku.hk
Lingxiao WangToyota Technological Institute at ChicagoVerified email at ttic.edu
Saket SatheSenior Applied Scientist, AmazonVerified email at amazon.com
Charu AggarwalDistinguished Research Staff Member, IBM T. J. Watson Research CenterVerified email at us.ibm.com
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Xiao ZhangCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jinfeng Yi (易津锋)Verified email at jd.com
Bo LiUniversity of Illinois at Urbana–ChampaignVerified email at illinois.edu
Jian MaRay and Stephanie Lane Professor, School of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
David EvansUniversity of Virginia, Computer ScienceVerified email at virginia.edu
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
Amulya YadavAssistant Professor, Penn StateVerified email at psu.edu
Bodo RosenhahnL3S Research Center / Leibniz Universität HannoverVerified email at tnt.uni-hannover.de
Follow
Jinghui Chen
Assistant Professor of Information Sciences and Technology, Penn State University
Verified email at psu.edu - Homepage