Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jianer ChenProfessor of Computer Science, Texas A&M UniversityVerified email at cse.tamu.edu
- Jianxin WangSchool of Computer Science and Engineering, Central South universityVerified email at mail.csu.edu.cn
- Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Ke YupingThe Hong Kong Polytechnic UniversityVerified email at connect.polyu.hk
- Sandeep RBIndian Institute of Technology DharwadVerified email at iitdh.ac.in
- Ye JunjiePh. D. Student, The Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
- Hanchun YuanCentral South UniversityVerified email at csu.edu.cn
- Xiating OuyangUniversity of Wisconsin-MadisonVerified email at cs.wisc.edu
- Martín D. SafeDepartamento de Matemática, Universidad Nacional del Sur & INMABBB (UNS-CONICET)Verified email at uns.edu.ar
- Luciano N. GrippoUniversidad Nacional de General Sarmiento - CONICETVerified email at campus.ungs.edu.ar
- Yota OtachiNagoya UniversityVerified email at nagoya-u.jp
- Ashutosh RaiDepartment of Mathematics, IIT DelhiVerified email at maths.iitd.ac.in
- Xiaochun CaoSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
- Théo PierronUniversité de LyonVerified email at univ-lyon1.fr
- Gabriel BathieEcole Normale Supérieure de LyonVerified email at ens-lyon.fr
- Nicolas BousquetCNRS, LIRIS, University Lyon 1, Univ. de LyonVerified email at liris.cnrs.fr
- Shenghua WangThe Hong Kong Polytechnic UniversityVerified email at connect.polyu.hk
- Dhanyamol AntonyPostdoctoral Fellow, Indian Institute of Science BangaloreVerified email at iisc.ac.in
- Nate VeldtTexas A&M UniversityVerified email at tamu.edu
- Nicolas BOUSQUETEDFVerified email at edf.fr