Difference between revisions of "Event:AsiaCCS 2020"

From ConfIDent
m (Text replacement - "[^=]User:Curator 83" to "Ch")
 
(6 intermediate revisions by 2 users not shown)
Line 2: Line 2:
 
|Acronym=AsiaCCS 2020
 
|Acronym=AsiaCCS 2020
 
|Title=15th ACM ASIA Conference on Computer and Communications Security
 
|Title=15th ACM ASIA Conference on Computer and Communications Security
 +
|Ordinal=15
 +
|In Event Series=Event Series:AsiaCCS
 +
|Single Day Event=no
 +
|Start Date=2020/10/05
 +
|End Date=2020/10/09
 +
|Event Status=as scheduled
 +
|Event Mode=online
 +
|Academic Field=Computer Security; Computer Science
 +
|Official Website=https://asiaccs2020.cs.nthu.edu.tw/
 
|Type=Conference
 
|Type=Conference
|Homepage=https://asiaccs2020.cs.nthu.edu.tw/
 
|City=Taipei
 
|Country=Taiwan
 
 
|has general chair=Hung-Min Sun, Shiuh-Pyng Shieh
 
|has general chair=Hung-Min Sun, Shiuh-Pyng Shieh
 
|has program chair=Guofei Gu, Giuseppe Ateniese
 
|has program chair=Guofei Gu, Giuseppe Ateniese
|has workshop chair=HsuChun Hsiao, Tianqing Zhou
+
|has workshop chair=Hsu Chun Hsiao, Tianqing Zhou
|has tutorial chair=User:Curator 83iaChi Teng
+
|has tutorial chair=Chia Chi Teng
 
|Has PC member=Adam Doup, Ahmad-Reza Sadeghi, Alex Kapravelos, Alexandra Dmitrienko, Amin Kharraz, Audun Josang
 
|Has PC member=Adam Doup, Ahmad-Reza Sadeghi, Alex Kapravelos, Alexandra Dmitrienko, Amin Kharraz, Audun Josang
 
|pageCreator=User:Curator 52
 
|pageCreator=User:Curator 52
 
|pageEditor=User:Curator 52
 
|pageEditor=User:Curator 52
 
|contributionType=1
 
|contributionType=1
|In Event Series=Event Series:AsiaCCS
 
|Single Day Event=no
 
|Start Date=2020/10/05
 
|End Date=2020/10/09
 
 
}}
 
}}
 +
{{Event Deadline}}
 +
{{Organizer
 +
|Contributor Type=organization
 +
|Organization=Special Interest Group on Security, Audit and Control, Association for Computing Machinery
 +
}}
 +
{{Event Metric}}
 +
{{S Event}}
 
==Call for Papers==
 
==Call for Papers==
  
Line 24: Line 33:
 
We invite submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
 
We invite submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:
  
* Access control
+
*Access control
* Accounting and audit
+
*Accounting and audit
* Applied cryptography
+
*Applied cryptography
* Authentication
+
*Authentication
* Big data security and privacy
+
*Big data security and privacy
* Biometrics security
+
*Biometrics security
* Blockchain security and privacy
+
*Blockchain security and privacy
* Cloud computing security
+
*Cloud computing security
* Computer forensics
+
*Computer forensics
* Cyber-physical system security
+
*Cyber-physical system security
* Data and application security
+
*Data and application security
* Embedded systems security
+
*Embedded systems security
* Formal methods for security
+
*Formal methods for security
* Hardware-based security and applications
+
*Hardware-based security and applications
* IoT security and privacy
+
*IoT security and privacy
* Key management
+
*Key management
* Malware and botnets
+
*Malware and botnets
* Mobile computing security
+
*Mobile computing security
* Network security
+
*Network security
* Operating system security
+
*Operating system security
* Practical post-quantum security
+
*Practical post-quantum security
* Privacy-enhancing technology
+
*Privacy-enhancing technology
* Runtime attacks and defenses
+
*Runtime attacks and defenses
* Secure computation
+
*Secure computation
* Security architectures
+
*Security architectures
* Security of critical infrastructures
+
*Security of critical infrastructures
* Security metrics
+
*Security metrics
* Software security
+
*Software security
* Threat modeling
+
*Threat modeling
* Trusted computing
+
*Trusted computing
* Usable security and privacy
+
*Usable security and privacy
* Web security
+
*Web security
* Wireless security and privacy
+
*Wireless security and privacy
  
 
==Important Dates==  
 
==Important Dates==  
 
2 rounds of submission/review)
 
2 rounds of submission/review)
 
August Deadline:
 
August Deadline:
* Paper submission deadline: August 20, 2019
+
*Paper submission deadline: August 20, 2019
* Author notification: October 25, 2019
+
*Author notification: October 25, 2019
* Camera ready due: November 25, 2019
+
*Camera ready due: November 25, 2019
 
December Deadline:
 
December Deadline:
* Paper submission deadline: December 10, 2019
+
*Paper submission deadline: December 10, 2019
* Author notification: February 15, 2020
+
*Author notification: February 15, 2020
* Camera ready due: March 15, 2020
+
*Camera ready due: March 15, 2020
* Conference date: June 1-5, 2020
+
*Conference date: June 1-5, 2020
  
 
==Paper Formatting==
 
==Paper Formatting==
Line 77: Line 86:
  
 
==Anonymous Submissions==
 
==Anonymous Submissions==
ASIACCS is employing a double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations should not appear in the paper. Authors should avoid obvious self-references and should appropriately blind them if used. The list of authors cannot be changed after the acceptance decision is made unless approved by the ProgramChairs.
+
ASIACCS is employing a double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations should not appear in the paper. Authors should avoid obvious self-references and should appropriately blind them if used. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs.
  
 
==Double and Concurrent Submissions==
 
==Double and Concurrent Submissions==
Line 96: Line 105:
  
 
==Organization==
 
==Organization==
HonoraryChairs:
+
Honorary Chairs:
* Der-Tsai Lee (Academia Sinica)
+
*Der-Tsai Lee (Academia Sinica)
* Yen-Nun Huang (Academia Sinica)
+
*Yen-Nun Huang (Academia Sinica)
  
GeneralChairs:
+
General Chairs:
* Hung-Min Sun (National Tsing Hua University)
+
*Hung-Min Sun (National Tsing Hua University)
* Shiuh-Pyng Shieh (NationalChiao Tung University)
+
*Shiuh-Pyng Shieh (National Chiao Tung University)
  
ProgramChairs:
+
Program Chairs:
* Guofei Gu (Texas A&M University, USA)
+
*Guofei Gu (Texas A&M University, USA)
* Giuseppe Ateniese (Stevens Institute of Technology, USA)
+
*Giuseppe Ateniese (Stevens Institute of Technology, USA)
  
OrganizingChairs:
+
Organizing Chairs:
* Yu-Sung Wu (NationalChiao Tung University)
+
*Yu-Sung Wu (National Chiao Tung University)
* Ming-Hour Yang Chung YuanChristian University)
+
*Ming-Hour Yang Chung Yuan Christian University)
  
Local arrangementChair:
+
Local arrangement Chair:
*Chia-Mu Yu (NationalChung Hsing University)
+
*Chia-Mu Yu (National Chung Hsing University)
  
RegistrationChair:
+
Registration Chair:
* JiaChing Ying (NationalChung Hsing University)
+
*Jia Ching Ying (National Chung Hsing University)
  
PublicationChair:
+
Publication Chair:
* Ming-Hung Wang (FengChia University)
+
*Ming-Hung Wang (Feng Chia University)
  
PublicityChair:
+
Publicity Chair:
* Lo-Yao Yeh (National Center for High-performance Computing)
+
*Lo-Yao Yeh (National Center for High-performance Computing)
  
WebChair:
+
Web Chair:
* Kuo-Hui Yeh (National Dong Hwa University)
+
*Kuo-Hui Yeh (National Dong Hwa University)
  
FinanceChair:
+
Finance Chair:
* Ruei-Hau Hsu (National Sun Yat-sen University)
+
*Ruei-Hau Hsu (National Sun Yat-sen University)
  
WorkshopChair:
+
Workshop Chair:
* HsuChun Hsiao (National Taiwan University)
+
*Hsu Chun Hsiao (National Taiwan University)
* Tianqing Zhou (University of Technology Sydney, Australia)
+
*Tianqing Zhou (University of Technology Sydney, Australia)
  
TutorialChair:
+
Tutorial Chair:
*ChiaChi Teng (Brigham Young University, USA)
+
*Chia Chi Teng (Brigham Young University, USA)
  
PosterChair:
+
Poster Chair:
* Ji Zhang (The University of Southern Queensland, Australia)
+
*Ji Zhang (The University of Southern Queensland, Australia)
  
 
Steering Committee:
 
Steering Committee:
* Gail-Joon Ahn (Arizona State University, USA)
+
*Gail-Joon Ahn (Arizona State University, USA)
* Robert Deng (Singapore Management University, Singapore) –Chair (2013-2017)
+
*Robert Deng (Singapore Management University, Singapore) –Chair (2013-2017)
* Adrian Perrig (ETH Zürich, Switzerland)
+
*Adrian Perrig (ETH Zürich, Switzerland)
* Kui Ren (Zhejiang University,China)
+
*Kui Ren (Zhejiang University, China)
* Shiuhpyng Shieh (NationalChiao Tung University, Taiwan) – FoundingChair (2006-2013)
+
*Shiuhpyng Shieh (National Chiao Tung University, Taiwan) – Founding Chair (2006-2013)
* Xiaofeng Wang (Indiana University Bloomington, USA)
+
*Xiaofeng Wang (Indiana University Bloomington, USA)
* Jianying Zhou (Singapore University of Technology and Design, Singapore) –Chair
+
*Jianying Zhou (Singapore University of Technology and Design, Singapore) –Chair
  
 
Technical Program Committee:
 
Technical Program Committee:
Line 163: Line 172:
 
University of Oslo, Norway
 
University of Oslo, Norway
 
Cas Cremers
 
Cas Cremers
CISPA, GermanyChao Zhang
+
CISPA, Germany Chao Zhang
Tsinghua University,ChinaChengyu Song
+
Tsinghua University, China Chengyu Song
University of California, Riverside, USAChristian Probst
+
University of California, Riverside, USA Christian Probst
 
Unitec Institute of Technology, New Zealand
 
Unitec Institute of Technology, New Zealand
 
Cong Wang
 
Cong Wang
Line 182: Line 191:
 
University of Michigan-Dearborn
 
University of Michigan-Dearborn
 
Fan Zhang
 
Fan Zhang
Zhejiang University,China
+
Zhejiang University, China
 
Fang Song
 
Fang Song
 
Texas A&M University
 
Texas A&M University
Line 188: Line 197:
 
Stanford University / CISPA Helmholtz Center for Information Security
 
Stanford University / CISPA Helmholtz Center for Information Security
 
Hai Jin
 
Hai Jin
Huazhong University of Science and Technology,China
+
Huazhong University of Science and Technology, China
 
Heng Yin
 
Heng Yin
 
University of California, Riverside, USA
 
University of California, Riverside, USA
Line 207: Line 216:
 
Junjie Zhang
 
Junjie Zhang
 
Wright State University
 
Wright State University
KaiChenChinese Academy of Science,China
+
Kai Chen Chinese Academy of Science, China
Kehuan ZhangChinese University of Hong Kong, Hong Kong
+
Kehuan Zhang Chinese University of Hong Kong, Hong Kong
 
Kevin Borgolte
 
Kevin Borgolte
 
Princeton University, USA
 
Princeton University, USA
Line 223: Line 232:
 
Mauro Conti
 
Mauro Conti
 
University of Padua, Italy
 
University of Padua, Italy
MihaiChristodorescu
+
Mihai Christodorescu
 
Visa Research, USA
 
Visa Research, USA
 
Min Suk Kang
 
Min Suk Kang
 
National University of Singapore, Singapore
 
National University of Singapore, Singapore
 
Min Yang
 
Min Yang
Fudan University,China
+
Fudan University, China
 
Neil Gong
 
Neil Gong
 
Iowa State University/Duke University
 
Iowa State University/Duke University
Line 237: Line 246:
 
Peeter Laud
 
Peeter Laud
 
Cybernetica AS, Estonia
 
Cybernetica AS, Estonia
Purui SuChinese Academy of Science,China
+
Purui Su Chinese Academy of Science, China
 
Qi Li
 
Qi Li
 
Tsinghua University
 
Tsinghua University
Line 250: Line 259:
 
Reza Shroki
 
Reza Shroki
 
National University of Singapore, Singapore
 
National University of Singapore, Singapore
Sang KilCha
+
Sang Kil Cha
 
KAIST, Korea
 
KAIST, Korea
 
Selcuk Uluagac
 
Selcuk Uluagac
Line 256: Line 265:
 
Seungwon Shin
 
Seungwon Shin
 
KAIST, Korea
 
KAIST, Korea
Sherman S. M.Chow
+
Sherman S. M. Chow
TheChinese University of Hong Kong, Hong Kong
+
The Chinese University of Hong Kong, Hong Kong
 
Siu-Ming Yiu
 
Siu-Ming Yiu
 
Hong Kong University, Hong Kong
 
Hong Kong University, Hong Kong
Line 274: Line 283:
 
Qatar Computing Research Institute, Qatar
 
Qatar Computing Research Institute, Qatar
 
Tobias Lauinger
 
Tobias Lauinger
University ofChicago
+
University of Chicago
 
Vinod Ganapathy
 
Vinod Ganapathy
 
Indian Institute of Science, India
 
Indian Institute of Science, India
Line 286: Line 295:
 
Indiana University Bloomington
 
Indiana University Bloomington
 
Xiaolong Bai
 
Xiaolong Bai
Alibaba Group,China
+
Alibaba Group, China
 
Xinyi Huang
 
Xinyi Huang
Fujian Normal University,China
+
Fujian Normal University, China
XiuzhenCheng
+
Xiuzhen Cheng
 
The George Washington University, USA
 
The George Washington University, USA
 
Yajin Zhou
 
Yajin Zhou
Zhejiang University,China
+
Zhejiang University, China
 
Yan Huang
 
Yan Huang
 
Indiana University Bloomington
 
Indiana University Bloomington
Line 308: Line 317:
 
KAIST, Korea
 
KAIST, Korea
 
Yu Yu
 
Yu Yu
Shanghai Jiao Tong University,China
+
Shanghai Jiao Tong University, China
 
Yuan Tian
 
Yuan Tian
 
University of Virginia, USA
 
University of Virginia, USA

Latest revision as of 06:26, 8 September 2023

Deadlines
organization
Metrics
Venue
Loading map...

Call for Papers

Conference Topics

We invite submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security. Areas of interest for ASIACCS 2020 include, but are not limited to:

  • Access control
  • Accounting and audit
  • Applied cryptography
  • Authentication
  • Big data security and privacy
  • Biometrics security
  • Blockchain security and privacy
  • Cloud computing security
  • Computer forensics
  • Cyber-physical system security
  • Data and application security
  • Embedded systems security
  • Formal methods for security
  • Hardware-based security and applications
  • IoT security and privacy
  • Key management
  • Malware and botnets
  • Mobile computing security
  • Network security
  • Operating system security
  • Practical post-quantum security
  • Privacy-enhancing technology
  • Runtime attacks and defenses
  • Secure computation
  • Security architectures
  • Security of critical infrastructures
  • Security metrics
  • Software security
  • Threat modeling
  • Trusted computing
  • Usable security and privacy
  • Web security
  • Wireless security and privacy

Important Dates

2 rounds of submission/review) August Deadline:

  • Paper submission deadline: August 20, 2019
  • Author notification: October 25, 2019
  • Camera ready due: November 25, 2019

December Deadline:

  • Paper submission deadline: December 10, 2019
  • Author notification: February 15, 2020
  • Camera ready due: March 15, 2020
  • Conference date: June 1-5, 2020

Paper Formatting

Submissions to ASIACCS are to be written in English. Papers must be at most 12 pages including bibliography. However, a maximum of 3 additional pages can be used for well-marked appendices. Note that appendices cannot exceed 3 pages even if the main text is less than 12 pages. Submissions must follow the new ACM conference template, which has been updated for 2017 (Use sigconf style). Submissions should not use older ACM formats or non-standard formatting. Submissions must be in Portable Document Format (.pdf). Authors should devote special care that fonts, images, tables and figures comply with common standards and do not generate problems for reviewers. Systematization of knowledge papers need to prefix the paper title with “SoK:”. Submissions not meeting the formatting requirements risk rejection without consideration of their merits.

Submission Site

The site for paper submission is: https://asiaccs20.hotcrp.com/. Please read the above submission instructions before submitting the paper. If you have any questions, please contact: asiaccs2020_chairs@is.cs.nthu.edu.tw.

Anonymous Submissions

ASIACCS is employing a double-blind reviewing process. All submissions should be appropriately anonymized. Author names and affiliations should not appear in the paper. Authors should avoid obvious self-references and should appropriately blind them if used. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs.

Double and Concurrent Submissions

Submissions to ASIACCS 2020 must not substantially overlap with papers that are published or simultaneously submitted to other venues (including journals or conferences/workshops). Double-submission will result in immediate rejection. Detected violations may be reported to other conference chairs and journal editors.

Paper Revision and Resubmission

Rejected papers in the August round cannot be resubmitted in the December round. A small number of papers in the August submission round may receive a Revise decision, rather than Accept or Reject, and may be revised and resubmitted to the December round together with the response to reviewers' comments. The revision may include running additional experiments, improving the paper’s presentation, or other such improvements. Papers meeting the expectations will typically be accepted. Additional revisions will be requested only in exceptional circumstances.

Ethical Considerations

Authors should take care of clarifying any potential ethical and legal concerns to their results, highly critical vulnerabilities or exploits, etc., and provide evidence that they have thoroughly considered such issues. The Program Committee reserves the right to reject a submission if insufficient evidence is presented that ethical or relevant legal concerns were appropriately addressed.

Camera-Ready and Conference Presentation

If a paper is accepted, the author list in submission cannot be changed when preparing the camera-ready version. Authors of accepted papers must also guarantee that their papers will be presented at the conference. At least one author of the paper must be registered at the appropriate full conference rate.

Early Rejection and Appeals

There will be no conventional rebuttal process. Papers that receive substantially negative initial reviews will be rejected early. The authors of early-rejected papers, and only such papers, will receive a copy of their initial reviews. Authors who substantively disagree with the reviews can appeal to the PC chairs. Authors’ appeals must clearly and explicitly identify concrete disagreements with factual statements in the initial reviews that should be adjudicated by a special arbitration reviewer who may be recruited by the PC chairs. Appealing a submission that was rejected early will keep it under consideration, and it cannot be withdrawn or resubmitted elsewhere until the final notification of acceptance or rejection. For inquiries on technical program, please contact program chairs: asiaccs2020_chairs@is.cs.nthu.edu.tw.

Organization

Honorary Chairs:

  • Der-Tsai Lee (Academia Sinica)
  • Yen-Nun Huang (Academia Sinica)

General Chairs:

  • Hung-Min Sun (National Tsing Hua University)
  • Shiuh-Pyng Shieh (National Chiao Tung University)

Program Chairs:

  • Guofei Gu (Texas A&M University, USA)
  • Giuseppe Ateniese (Stevens Institute of Technology, USA)

Organizing Chairs:

  • Yu-Sung Wu (National Chiao Tung University)
  • Ming-Hour Yang Chung Yuan Christian University)

Local arrangement Chair:

  • Chia-Mu Yu (National Chung Hsing University)

Registration Chair:

  • Jia Ching Ying (National Chung Hsing University)

Publication Chair:

  • Ming-Hung Wang (Feng Chia University)

Publicity Chair:

  • Lo-Yao Yeh (National Center for High-performance Computing)

Web Chair:

  • Kuo-Hui Yeh (National Dong Hwa University)

Finance Chair:

  • Ruei-Hau Hsu (National Sun Yat-sen University)

Workshop Chair:

  • Hsu Chun Hsiao (National Taiwan University)
  • Tianqing Zhou (University of Technology Sydney, Australia)

Tutorial Chair:

  • Chia Chi Teng (Brigham Young University, USA)

Poster Chair:

  • Ji Zhang (The University of Southern Queensland, Australia)

Steering Committee:

  • Gail-Joon Ahn (Arizona State University, USA)
  • Robert Deng (Singapore Management University, Singapore) –Chair (2013-2017)
  • Adrian Perrig (ETH Zürich, Switzerland)
  • Kui Ren (Zhejiang University, China)
  • Shiuhpyng Shieh (National Chiao Tung University, Taiwan) – Founding Chair (2006-2013)
  • Xiaofeng Wang (Indiana University Bloomington, USA)
  • Jianying Zhou (Singapore University of Technology and Design, Singapore) –Chair

Technical Program Committee: Adam Doup Arizona State University, USA Ahmad-Reza Sadeghi TU Darmstadt, Germany Alex Kapravelos North Carolina State University, USA Alexandra Dmitrienko University of Würzburg Amin Kharraz University of Illinois, USA Audun Josang University of Oslo, Norway Cas Cremers CISPA, Germany Chao Zhang Tsinghua University, China Chengyu Song University of California, Riverside, USA Christian Probst Unitec Institute of Technology, New Zealand Cong Wang City University of Hong Kong, Hong Kong Dan Wallach Rice University Daniel Xiapu Luo The Hong Kong Polytechnic University, Hong Kong David Naccache École normale supérieure, France Davide Balzarotti Eurecom, France Debin Gao Singapore Management University, Singapore Di Ma University of Michigan-Dearborn Fan Zhang Zhejiang University, China Fang Song Texas A&M University Giancarlo Pellegrino Stanford University / CISPA Helmholtz Center for Information Security Hai Jin Huazhong University of Science and Technology, China Heng Yin University of California, Riverside, USA Hong-sheng Zhou Virginia Commonwealth University Hongxin Hu Clemson University Jialong Zhang ByteDance AI Lab Jianying Zhou Singapore University of Technology and Design, Singapore Josef Pieprzyk Queensland University of Technology, Australia Josep Domingo-Ferrer Universitat Rovira i Virgili, Spain Joseph K. Liu Monash University, Australia Junjie Zhang Wright State University Kai Chen Chinese Academy of Science, China Kehuan Zhang Chinese University of Hong Kong, Hong Kong Kevin Borgolte Princeton University, USA Kwok-yan Lam Nanyang Technological University, Singapore Lorenzo Cavallaro King’s College London, UK Lucas Davi University of Duisburg-Essen, Germany Man Ho Allen Au Hong Kong Polytechnic University Manuel Egele Boston University, USA Mauro Conti University of Padua, Italy Mihai Christodorescu Visa Research, USA Min Suk Kang National University of Singapore, Singapore Min Yang Fudan University, China Neil Gong Iowa State University/Duke University Ninghui Li Purdue University, USA Nitesh Saxena University of Alabama at Birmingham Peeter Laud Cybernetica AS, Estonia Purui Su Chinese Academy of Science, China Qi Li Tsinghua University Qiang Tang New Jersey Institute of Technology Qiang Zeng University of South Carolina R. Sekar Stony Brook University, USA Rei Safavi-Naini University of Calgary, Canada Reza Shroki National University of Singapore, Singapore Sang Kil Cha KAIST, Korea Selcuk Uluagac Florida International University, USA Seungwon Shin KAIST, Korea Sherman S. M. Chow The Chinese University of Hong Kong, Hong Kong Siu-Ming Yiu Hong Kong University, Hong Kong Sotiris Ioannidis FORTH, Greece Susan Hohenberger Johns Hopkins University Tamara Rezk INRIA Sophia Antipolis-Méditerranée Tanja Lange Eindhoven University of Technology, Netherlands Tao Wei Baidu USA LLC, USATibor Jager Paderborn University, Germany Ting Yu Qatar Computing Research Institute, Qatar Tobias Lauinger University of Chicago Vinod Ganapathy Indian Institute of Science, India Wenliang Du Syracuse University, USA William Robertson Northeastern University, USA Xiao Wang Northwestern University Xiaojing Liao Indiana University Bloomington Xiaolong Bai Alibaba Group, China Xinyi Huang Fujian Normal University, China Xiuzhen Cheng The George Washington University, USA Yajin Zhou Zhejiang University, China Yan Huang Indiana University Bloomington Yan Shoshitaishvili Arizona State University Yang Liu Nanyang Technological University, Singapore Yeongjin Jang Oregon State University, USA Yinqian Zhang Ohio State University, USA Yong Guan Iowa State University, USA Yongdae Kim KAIST, Korea Yu Yu Shanghai Jiao Tong University, China Yuan Tian University of Virginia, USA Yupeng Zhang Texas A&M University Zhaoyan Xu Palo Alto Networks

Cookies help us deliver our services. By using our services, you agree to our use of cookies.