Get my own profile
Public access
View all27 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Tok Wang LingProfessor of Computer Science, National University of SingaporeVerified email at comp.nus.edu.sg
BAO ZHIFENGRMIT University; The University of MelbourneVerified email at rmit.edu.au
Xiaofeng MengProfessor, Renmin University of ChinaVerified email at ruc.edu.cn
Gao CongNanyang Technological UniversityVerified email at ntu.edu.sg
Chee Yong ChanNational University of SingaporeVerified email at comp.nus.edu.sg
Huayu WuVerified email at i2r.a-star.edu.sg
Ying LuDiDi Research America, University of Southern CaliforniaVerified email at didichuxing.com
Shengyue JiGoogleVerified email at google.com
Xiaokui XiaoNational University of SingaporeVerified email at nus.edu.sg
Xuan ZhouProfessor, East China Normal UniversityVerified email at dase.ecnu.edu.cn
Xiaofang ZhouHong Kong University of Science and TechnologyVerified email at cse.ust.hk
Dan LinAssociate Professor, Director of I-Privacy Lab, University of MissouriVerified email at missouri.edu
Zhongyuan WangFacebookVerified email at fb.com
Cyrus ShahabiProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
Bogdan CautisUniversity of Paris-Sud 11Verified email at u-psud.fr
Juwei ShiMicrosoft STCVerified email at microsoft.com
Yongluan ZhouUniversity of CopenhagenVerified email at di.ku.dk
Christian S. JensenAalborg University, Department of Computer ScienceVerified email at cs.aau.dk
Pierre SenellartProfessor of Computer Science, École normale supérieureVerified email at ens.fr
M. Tamer ÖzsuUniversity Professor, University of WaterlooVerified email at uwaterloo.ca