Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
- Yuxuan ChenShandong UniversityVerified email at sdu.edu.cn
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
- Yue ZhaoUniversity of Chinese Academy of SciencesVerified email at iie.ac.cn
- Yunhui LongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Heqing HuangAffiliate Professor @ UCAS, Bytedance US AI Lab/LLM Security, IBM Watson AI and Cloud Security
Follow
Xuejing Yuan
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876
Verified email at bupt.edu.cn