Crea il mio profilo
Accesso pubblico
Visualizza tutto33 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ninghui LiProfessor of Computer Science, Purdue UniversityEmail verificata su cs.purdue.edu
- Somesh JhaLubar Chair of Computer Science, University of WisconsinEmail verificata su cs.wisc.edu
- Zhikun ZhangZhejiang UniversityEmail verificata su zju.edu.cn
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Bolin DingAlibaba GroupEmail verificata su alibaba-inc.com
- Graham CormodeMeta AI, University of WarwickEmail verificata su warwick.ac.uk
- Aiping XiongThe Pennsylvania State UniversityEmail verificata su psu.edu
- Zhou LiAssistant Professor, University of California, IrvineEmail verificata su uci.edu
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- David EvansUniversity of Virginia, Computer ScienceEmail verificata su virginia.edu
- Elaine ShiCarnegie Mellon UniversityEmail verificata su cs.cmu.edu