Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Beng Chin OOINational University of SingaporeVerified email at comp.nus.edu.sg
Meihui ZHANGBeijing Institute of TechnologyVerified email at bit.edu.cn
Qian LinResearch Engineer, ByteDanceVerified email at bytedance.com
Anwitaman DattaNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Ee-Chien ChangNational University of SingaporeVerified email at comp.nus.edu.sg
Hung DangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Prateek SaxenaNational University of SingaporeVerified email at comp.nus.edu.sg
Wei WangByteDanceVerified email at bytedance.com
Georgios TheodoropoulosSUSTech, Shenzhen, ChinaVerified email at sustech.edu.cn
CHUNWANG ZHANGSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Michael LeesAssociate Professor, University of AmsterdamVerified email at uva.nl
Hao Zhang4Paradigm TechnologyVerified email at 4paradigm.com
Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
Milind GanjooTwitterVerified email at cs.stanford.edu
Stefano BraghinIBM ResearchVerified email at ie.ibm.com
Jinyang GaoAlibaba Group