20112023

Research activity per year

Network

Wenke Lee

  • Georgia Institute of Technology
  • School of Computer Science
  • College of Computing

External person

Shouling Ji

  • Zhejiang University

External person

Taesoo Kim

  • Georgia Institute of Technology
  • School of Computer Science

External person

Chengyu Song

  • Georgia Institute of Technology
  • School of Computer Science
  • University of California at Riverside

External person

Xuhong Zhang

  • Zhejiang University
  • Zhejiang University NGICS Platform

External person

Meng Xu

  • Georgia Institute of Technology
  • School of Computer Science

External person

Raheem Beyah

  • Georgia Institute of Technology

External person

Debin Gao

  • Singapore Management University
  • School of Information Systems

External person

Peiyu Liu

  • Zhejiang University

External person

Lirong Fu

  • Zhejiang University

External person

Wenzhi Chen

  • Zhejiang University

External person

Shi Min Hu

  • Tsinghua University

External person

Jia Ju Bai

  • Tsinghua University

External person

Byoungyoung Lee

  • Georgia Institute of Technology
  • School of Computer Science

External person

Michael Backes

  • Helmholtz Center for Information Security
  • Saarland University
  • Max Planck Institute for Software Systems

External person

Dabi Zou

  • Singapore Management University
  • School of Information Systems

External person

Penghui Li

  • Chinese University of Hong Kong

External person

Xiaofeng Zhang

  • Graduate University of Chinese Academy of Sciences
  • Chinese Academy of Sciences
  • Institute of Computing Technology Chinese Academy of Sciences

External person

Weiping Wen

  • Peking University
  • School of Software and Microelectronics

External person

Yutian Yang

  • Zhejiang University

External person

Chenggang Wu

  • Chinese Academy of Sciences
  • Institute of Computing Technology Chinese Academy of Sciences
  • State Key Laboratory of Computer Architecture
  • State Key Laboratory of Computer Architecture
  • Key Laboratory of Computer System and Architecture
  • State Key Laboratory of Computer Architecture
  • Key Laboratory of Computer System and Architecture
  • State Key Laboratory of Computer Architecture
  • SKL of Computer Architecture
  • Graduate University of Chinese Academy of Sciences
  • State Key Laboratory of Computer Architecture
  • Zhongguancun Laboratory

External person

Mengyao Xie

  • Chinese Academy of Sciences
  • Graduate University of Chinese Academy of Sciences
  • Institute of Computing Technology Chinese Academy of Sciences

External person

Zhe Wang

  • Institute of Computing Technology Chinese Academy of Sciences
  • Graduate University of Chinese Academy of Sciences
  • State Key Laboratory of Computer Architecture
  • State Key Laboratory of Computer Architecture
  • State Key Laboratory of Computer Architecture
  • Chinese Academy of Sciences
  • Zhongguancun Laboratory

External person

Weiheng Bai

  • University of Minnesota

External person

Chenxiong Qian

  • Georgia Institute of Technology
  • School of Computer Science

External person

Chenyang Lyu

  • Zhejiang University

External person

Yan Kang

  • State Key Laboratory of Computer Architecture
  • Chinese Academy of Sciences
  • Institute of Computing Technology Chinese Academy of Sciences
  • Graduate University of Chinese Academy of Sciences

External person

Guofei Jiang

  • NEC Laboratories America, Inc.

External person

Kui Ren

  • Xidian University
  • Zhejiang University

External person

Wenjia Zhao

  • Xi'an Jiaotong University

External person

DInghao Liu

  • Zhejiang University

External person

Zu Ming Jiang

  • Tsinghua University

External person

Wei Meng

  • Chinese University of Hong Kong

External person

Zhichun Li

  • NEC Laboratories America, Inc.

External person

Mathias Payer

  • University of California
  • EPFL

External person

Zhenyu Wu

  • NEC Laboratories America, Inc.

External person

Cong Zheng

  • Georgia Institute of Technology
  • School of Computer Science

External person

Long Lu

  • College of Computing
  • Georgia Institute of Technology
  • School of Computer Science
  • SUNY Stony Brook

External person

Wenbo Shen

  • Zhejiang University
  • Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province

External person

Yinqian Zhang

  • The Ohio State University
  • Southern University of Science and Technology

External person

Stefan Nürnberger

  • German Research Center for Artificial Intelligence
  • Saarland University

External person

Chenggang Qin

  • Zhejiang University
  • Ant Group

External person

Wang Yu

  • Ant Group
  • Ant Group

External person

Min Yang

  • Fudan University
  • Shanghai University

External person

Tianyu Zhou

  • Xidian University
  • Zhejiang University

External person

Simon P. Chung

  • Georgia Institute of Technology
  • School of Computer Science
  • College of Computing

External person

Wenhai Wang

  • Zhejiang University

External person

Sizhuang Liang

  • Georgia Institute of Technology

External person

Yuanming Lai

  • Graduate University of Chinese Academy of Sciences
  • Chinese Academy of Sciences
  • Institute of Computing Technology Chinese Academy of Sciences

External person

William Harris

  • Georgia Institute of Technology

External person

Min Yang

  • Fudan University

External person

Hong Liang

  • Zhejiang University

External person

Priyanka Bose

  • University of California at Santa Barbara

External person

Hong Hu

  • Georgia Institute of Technology

External person

Ruian Duan

  • Georgia Institute of Technology
  • School of Computer Science

External person

Saiyu Qi

  • Xidian University

External person

Zhenguang Liu

  • Zhejiang University

External person

Jietao Xiao

  • Xidian University

External person

Zhiyun Qian

  • University of Michigan
  • University of California at Riverside
  • Department of Computer Sciences
  • University of California
  • University of Minnesota
  • University of California

External person

Yuwei Li

  • Zhejiang University

External person

Wei Han Lee

  • IBM Research

External person

Peng Cheng

  • Zhejiang University

External person

Qingyang Zhou

  • University of Minnesota

External person

Xinyu Xing

  • Northwestern University

External person

Zihui Zhang

  • Zhejiang University

External person

Qinming He

  • Zhejiang University

External person

Marius Fleischer

  • University of California at Santa Barbara

External person

Jianhai Chen

  • Zhejiang University

External person

Kyle Zeng

  • Arizona State University

External person

Jingchang Qin

  • Zhejiang University

External person

Qibin Sun

  • University of Science and Technology of China

External person

Sangho Lee

  • Georgia Institute of Technology
  • School of Computer Science

External person

Tiffany Bao

  • Arizona State University

External person

Adam Doupé

  • Arizona State University

External person

Peng Cheng

  • Zhejiang University

External person

Nanzi Yang

  • Xidian University

External person

Ming Wei Shih

  • Georgia Institute of Technology
  • School of Computer Science

External person

Jianhao Xu

  • Nanjing University

External person

Xun Xie

  • University of Minnesota

External person

Jianjun Huang

  • Purdue University
  • Department of Computer Sciences

External person

Christopher Kruegel

  • Department of Computer Science
  • University of California at Santa Barbara
  • University of California

External person

Yuan Zhang

  • Fudan University

External person

Yan Shoshitaishvili

  • Arizona State University

External person

Yang He

  • University of Minnesota

External person

Yueyao Chen

  • Zhejiang University

External person

Chunfu Jia

  • Nankai University
  • Civil Aviation University of China
  • Information Security Evaluation Center of Civil Aviation
  • College of Computer and Control Engineering

External person

Siyang Xiong

  • D'crypt Pte Ltd

External person

Qiushi Wu

  • University of Minnesota

External person

Chunming Wu

  • Zhejiang Lab
  • Zhejiang University

External person

Tao Lu

  • Zhejiang University

External person

Yong Qi

  • Xi'an Jiaotong University

External person

Giovanni Vigna

  • University of California at Santa Barbara

External person

Bowen Wang

  • University of Minnesota

External person

Haoyu Ma

  • Nankai University
  • College of Computer and Control Engineering

External person

Wei Han Lee

  • IBM Research

External person

Tielei Wang

  • College of Computing
  • Georgia Institute of Technology
  • School of Computer Science

External person

Yiwei Zhang

  • Shanghai Jiao Tong University

External person

Yue Xiao

  • Indiana University

External person

Xusheng Xiao

  • NEC Laboratories America, Inc.

External person

Linke Li

  • Nanjing University

External person

B. Mao

  • New York University
  • Memorial Sloan-Kettering Cancer Center
  • Chemistry Department
  • Nanjing University

External person

Tuo Li

  • Tsinghua University

External person

Juanru Li

  • Feiyu Security
  • Shanghai Qi Zhi Institute
  • Shanghai Jiao Tong University

External person

David Pfaff

  • Saarland University

External person

Xinjie Ma

  • Nankai University
  • Singapore Management University
  • College of Computer and Control Engineering
  • School of Information Systems

External person

Yuanming Lai

  • Graduate University of Chinese Academy of Sciences
  • Institute of Computing Technology Chinese Academy of Sciences
  • Chinese Academy of Sciences

External person

Ting Wang

  • Pennsylvania State University

External person

Yong Qi

  • Xidian University

External person

Qinming Dai

  • Zhejiang University

External person

Zhu Ding

  • Nanjing University

External person

Jinku Li

  • Xidian University

External person

Dipanjan Das

  • University of California at Santa Barbara

External person

Xiaojing Liao

  • Georgia Institute of Technology
  • Indiana University

External person

Marie Therese Walter

  • Saarland University

External person

Ruoyu Wang

  • Arizona State University

External person

Yanjun Wu

  • CAS - Institute of Software

External person

Mingsen Wang

  • Zhejiang University

External person

Jianfeng Ma

  • Ant Group
  • Ant Group

External person

Yuan Chen

  • Zhejiang University

External person

Vasileios P. Kemerlis

  • Columbia University

External person

Yang Zhang

  • University of Minnesota
  • University of Minnesota Twin Cities
  • University of Minnesota

External person

Xiyu Yang

  • Fudan University

External person

Yi Fang

  • Feiyu Security

External person

Kefu Wu

  • University of Minnesota

External person

Binbin Zhao

  • Georgia Institute of Technology

External person

Xin Tan

  • Fudan University

External person

Changhua Luo

  • Chinese University of Hong Kong

External person

Haining Zhang

  • Nankai University
  • College of Computer and Control Engineering

External person

Yunlong Lyu

  • University of Science and Technology of China

External person

Xiangyu Zhang

  • Purdue University
  • Department of Computer Sciences

External person

Zhengjie Du

  • Nanjing University

External person

Tao Li

  • Nankai University

External person

Yang Ji

  • Georgia Institute of Technology
  • School of Computer Science

External person

Yeongjin Jang

  • Georgia Institute of Technology
  • School of Computer Science

External person

Siqi Ma

  • University of New South Wales

External person

Elisa Bertino

  • Purdue University
  • Department of Computer Sciences
  • Purdue University

External person

Zhenpeng Lin

  • Northwestern University

External person

Yuxuan Duan

  • Zhejiang University

External person