Italian Trulli

ACM CCS 2024

October 14-18, 2024 Salt Lake City, U.S.A.

Program Committee

Program Chairs

  • Engin Kirda, Northeastern University
  • David Lie, University of Toronto

Track Chairs

  • Software Security, Yuan Tian, UCLA
  • Web Security, Jason Polakis, University of Illinois, Chicago
  • Network Security, Aanjhan Ranganathan, Northeastern University
  • Formal Methods and Programming Languages, Catalin Hritcu, MPI-SP
  • Hardware, Side Channels, and CyberPhysical Systems, Yinqian Zhang, SUSTech
  • Applied Cryptography, Melek Onen, Institut Eurecom
  • Applied Cryptography, Katerina Mitrokotsa, University of St. Gallen
  • Machine Learning and Security, Reza Shokri, National University of Singapore
  • Machine Learning and Security, Murat Kantarcioglu, UT Dallas
  • Security Usability and Measurement, Blase Ur, University of Chicago
  • Security Usability and Measurement, Gianluca Stringhini, Boston University
  • Blockchain and Distributed Systems, Stefanie Roos, University of Kaiserslautern-Landau
  • Privacy and Anonymity, Wouter Lueks, CISPA

Program Committee

  • Aanjhan Ranganathan, Northeastern University
  • Aaron Johnson, U.S. Naval Research Laboratory
  • Abbas Acar, FIorida International University
  • Adam Doupe, Arizona State University
  • Adam Dziedzic, CISPA Helmholtz Center for Information Security
  • Adithya Bhat, Visa Research
  • Adrien Koutsos, Inria Paris
  • Aisling Connolly, DFINITY
  • Alan Zaoxing Liu, University of Maryland
  • Albert Cheu, Google Research
  • Alberto Sonnino, Mysten Labs & University College London (UCL)
  • Alejandro Russo, Chalmers University
  • Alessandro Sorniotti, IBM Research
  • Alexander Davidson, FCT/NOVA
  • Alexandre Bartel, Umeå University (Sweden)
  • Alexandros Kapravelos, NCSU
  • Alexios Voulimeneas, TU Delft
  • Ali Abbasi, CISPA Helmholtz Center for Information Security
  • Allison McDonald, Boston University
  • Aloni Cohen, University of Chicago
  • Alvaro A. Cardenas, University of California, Santa Cruz
  • Alysson Bessani, LASIGE, Faculdade de Ciencias, Universidade de Lisboa
  • Amin Kharraz, Florida International University
  • Amir Houmansadr, UMass Amherst
  • Amit Kumar Sikder, Georgia Institute of Technology
  • Amro Awad, North Carolina State University
  • Anastasia Borovykh, Imperial College London
  • Anat Bremler Barr, Tel Aviv University
  • Anca Nitulescu, None
  • Andreas Peter, Carl von Ossietzky Universität Oldenburg
  • Andrew Lewis-Pye, London School of Economics
  • Ang Chen, University of Michigan
  • Aniket Kate, Purdue University
  • Anil Kurmus, IBM Research Europe - Zurich
  • Anna Maria Mandalari, University College London
  • Antonio Faonio, EURECOM
  • Anupam Das, NC State
  • Aravind Machiry, Purdue University
  • Archita Agarwal, MongoDB
  • Arjun Bhagoji, University of Chicago
  • Arthur Gervais, University College London & UC Berkeley RDI
  • Atsuki Momose, University of Illinois Urbana-Champaign
  • Aurore Fass, CISPA Helmholtz Center for Information Security
  • Aviv Zohar, Hebrew University of Jerusalem
  • Babak AminAzad, Cloudflare
  • Bahruz Jabiyev, Dartmouth College
  • Bailey Kacsmar, University of Alberta
  • Balaji Palanisamy, University of Pittsburgh
  • Bas Spitters, Aarhus University
  • Ben Stock, CISPA
  • Ben Y. Zhao, University of Chicago
  • Benjamin Fuller, University of Connecticut
  • Benjamin Gregoire, Inria Sophia-Antipolis
  • Benjamin NGUYEN, INSA Centre Val de Loire
  • Benjamin Ujcich, Georgetown University
  • Benny Pinkas, Aptos Labs, Bar Ilan University
  • Bimal Viswanath, Virginia Tech
  • Binbin Zhao, Georgia Institute of Technology
  • Binghui Wang, Illinois Institute of Technology
  • Blase Ur, University of Chicago
  • Bolin Ding, Alibaba Group
  • Boris Köpf, Azure Research, Microsoft
  • Bruno Blanchet, Inria Paris
  • Camille Cobb, University of Illinois Urbana Champaign
  • Carlos Gañán, ICANN
  • Catalin Hritcu, MPI-SP
  • Catherine Easdon, Dynatrace Research
  • Charalampos Papamanthou, Yale University
  • Chaya Ganesh, Indian Institue of Science
  • Chelsea H. Komlo, University of Waterloo, Canada
  • Chen-Da Liu-Zhang, Luzern University of Applied Sciences and Arts & Web3 Foundation
  • Chenkai Weng, Northwestern University
  • Chia-Mu Yu, National Yang Ming Chiao Tung University
  • Chris Kanich, UIC
  • Christian Wressnegger, Karlsruhe Institute of Technology (KIT)
  • Chuan Guo, Meta
  • Clara Schneidewind, MPI-SP
  • Claudio Soriente, NEC Laboratories Europe
  • Cristian-Alexandru Staicu, CISPA
  • Cristina Onete, University of Limoges/XLIM/CNRS 7252
  • Daniel Escudero, J.P. Morgan AI Research
  • Daniel Genkin, Georgia Tech
  • Daniel Gruss, Graz University of Technology
  • Daniel Holcomb, UMass Amherst
  • Daniel Masny, Horst-Görtz Institute for IT Security and Faculty of Mathematics, Ruhr-Universität Bochum
  • Daniel Moghimi, Google
  • Daniel Slamanig, Universität der Bundeswehr München
  • Daniele Cono D’Elia, Sapienza University of Rome
  • Danilo Francati, Aarhus University
  • Daoyuan Wu, Nanyang Technological University
  • David Oswald, University of Birmingham
  • Davide Maiorca, University of Cagliari, Italy
  • Debajyoti Das, KU Leuven
  • Deepak Kumar, UC San Diego
  • Devashish Gosain, MPI-INF
  • Di Wang, King Abdullah University of Science and Technology
  • Dimitrios Papadopoulos, The Hong Kong University of Science and Technology
  • Diogo Barradas, University of Waterloo
  • Dmitry Evtyushkin, William & Mary
  • Dmitry Ponomarev, Binghampton University
  • Dominique Schröder, Friedrich-Alexander Universität Erlangen-Nürnberg
  • Dong Du, Shanghai Jiao Tong University
  • Dongdong She, Hong Kong University of Science and Technology
  • Doowon Kim, University of Tennessee Knoxville
  • Duc Bui, Snap Inc.
  • Duc Le, Visa Research
  • Eleanor Birrell, Pomona College
  • Eleftheria Makri, LIACS at Leiden University
  • Elisaweta Masserova, Carnegie Mellon University
  • Ellis Fenske, United States Naval Academy
  • Emiliano De Cristofaro, UC Riverside
  • Emre Gursoy, Koc University
  • Erik Tews, University of Twente
  • Erik-Oliver Blass, Airbus
  • Eugene Bagdasaryan, UMass
  • Evangelia Anna Markatou, TU Delft
  • Fan Zhang, Yale University
  • Fatih Turkmen, University of Groningen
  • Faysal Hossain Shezan, University of Texas at Arlington
  • Felix Günther, IBM Research Europe – Zurich
  • Feng Wu, Jiangsu University
  • Fengwei Zhang, Southern University of Science and Technology
  • Fengyuan Xu, Nanjing University
  • Filipo Sharevski, DePaul University
  • Florentin Rochet, University of Namur
  • Florian Tschorsch, Technische Universität Dresden
  • Foteini Baldimtsi, George Mason University, Mysten Labs
  • Frank Piessens, KU Leuven
  • Franziska Boenisch, CISPA
  • Frédéric Besson, Inria Rennes
  • Frederik Armknecht, University of Mannheim
  • Gabriel Kaptchuk, Boston University
  • Gabrielle Beck, Johns Hopkins University
  • Gang Wang, University of Illinois at Urbana-Champaign
  • Gaoning Pan, Hangzhou Dianzi University
  • Gargi Mitra, University of British Columbia
  • Geng Hong, Fudan University
  • George Theodorakopoulos, Cardiff University
  • Georgios Smaragdakis, Delft University of Technology (TU Delft)
  • Ghada Almashaqbeh, University of Connecticut
  • Ghassan Karame, Ruhr University Bochum
  • Gianluca Stringhini, Boston University
  • Giovane Moura, SIDN Labs and TU Delft
  • Giuseppe Ateniese, George Mason University
  • Greg Zaverucha, Microsoft Research
  • Guangdong Bai, University of Queensland
  • Guangliang Yang, Fudan University
  • Guofei Gu, Texas A&M
  • Guoxing Chen, Shanghai Jiao Tong University
  • Guozhu Meng, Institute of Information Engineering, Chinese Academy of Sciences, China
  • Guru Venkataramani, George Washington University
  • Habiba Farrukh, University of California Irvine
  • Haibin Zhang, Beijing Institute of Technology
  • Haipeng Cai, Washington State University
  • Hamed Okhravi, MIT Lincoln Laboratory
  • Hong Hu, The Pennsylvania State University
  • Hang Zhang, Indiana University Bloomington
  • Hanwen Feng, The University of Sydney
  • Haoyu Wang, Huazhong University of Science and Technology
  • Harish Karthikeyan, JPMorgan AI Research
  • Héber H. Arcolezi, Inria and École Polytechnique (IPP)
  • Heqing Huang, City University of Hong Kong
  • Hikaru Tsuchida, NEC Corporation
  • Hong-Sheng Zhou, Virginia Commonwealth University
  • Hongxin Hu, University of Buffalo
  • Huaming Chen, The University of Sydney
  • Hugo Lefeuvre, The University of Manchester
  • Ignacio Cascudo, IMDEA Software Institute
  • Ilia Shumailov, Google Deepmind
  • Indrakshi Ray, Colorado State University
  • Ioana Boureanu, University of Surrey
  • Isabel Wagner, University of Basel
  • Iskander Sanchez-Rola, NortonLifeLock
  • Ittay Eyal, Technion
  • Jakub Klemsa, Zama
  • James Hsin-yu Chiang, Aarhus University
  • Jamie Hayes, Deepmind
  • Jan Bobolz, University of Edinburgh
  • Jason Polakis, University of Illinois Chicago
  • Javier Carnerero Cano, IBM Research/Imperial College London
  • Jedidiah R. Crandall, Arizona State University
  • Jérémie Decouchant, TU Delft
  • Jeremy Clark, Concordia University
  • Jian Guo, Nanyang Technological University
  • Jian Liu, University of Tennessee
  • Jian Lou, Zhejiang University
  • Jiangshan Yu, Monash University
  • Jianjun Chen, Tsinghua University
  • Jianyu Niu, Southern University of Science and Technology
  • Jie Zhou, University of Rochester
  • Jinfei Liu, Zhejiang University
  • Jingjie Li, University of Edinburgh
  • Jinyuan Jia, Penn State
  • Joel Reardon, University of Calgary
  • Jonathan Katz, University of Maryland
  • Joseph Near, University of Vermont
  • Julian Loss, CISPA Helmoltz Center for Information Security
  • Justin Hsu, Cornell University
  • Kai Chen, Institute of Information Engineering
  • Kaihua Qin, Imperial College London
  • Kang Yang, State Key Laboratory of Cryptology
  • Kaoutar Elkhiyaoui, IBM Research Zurich
  • Kari Kostiainen, ETH Zurich
  • Karl Wüst, Mysten Labs
  • Katerina Mitrokotsa, University of St. Gallen
  • Katharina Boudgoust, CNRS, Univ Montpellier, LIRMM, France
  • Kaveh Razavi, ETH Zürich
  • Kazue Sako, Waseda University
  • Kehuan Zhang, Chinese University of Hong Kong
  • Keisuke Tanaka, Tokyo Institute of Technology
  • Kevin Borgolte, Ruhr University Bochum
  • Kirill Nikitin, Columbia University
  • Konrad Rieck, TU Berlin
  • Kostas Drakonakis, University of Crete & FORTH
  • Kristina Hostakova, ETH Zürich
  • Kun Sun, George Mason University
  • Lannan Lisa Luo, George Mason University
  • Le Guan, University of Georgia
  • Lefteris Kokoris-Kogias, IST Austria & Mysten Labs
  • Lei Zhang, Fudan University
  • Lenka Mareková, ETH Zurich
  • Limin Jia, CMU
  • Ling Ren, University of Illinois at Urbana-Champaign
  • Long Cheng, Clemson University
  • Luca Mariot, University of Twente
  • Lucas Davi, University of Duisburg-Essen
  • Lucianna Kiffer, ETH Zurich
  • Lucjan Hanzlik, CISPA Helmholtz Center for Information Security
  • Mainack Mondal, Indian Institute of Technology Kharagpur
  • Mang Zhao, CISPA Helmholtz Center for Information Security
  • Manuel Egele, Boston University
  • Marcel Keller, CSIRO’s Data61
  • Marco Gaboardi, Boston University
  • Marco Guarnieri, IMDEA Software Institute
  • Marco Squarcina, TU Wien
  • Marcus Botacin, Texas A&M University
  • Marika Swanberg, Boston University
  • Marilyn George, Mongo DB
  • Mário Alvim, Universidade Federal de Minas Gerais - UFMG
  • Mario Larangeira, Tokyo Institute of Technology
  • Mariusz Nowostawski, Norwegian University of Science and Technology
  • Martin Henze, RWTH Aachen University and Fraunhofer FKIE
  • Martin Johns, TU Braunschweig
  • Massimo Bartoletti, University of Cagliari
  • Mathias Humbert, University of Lausanne
  • Mathy Vanhoef, KU Leuven, Belgium
  • Matteo Campanelli, Matter Labs
  • Matteo Maffei, TU Wien
  • Matthew Jagielski, Google Research
  • Mattijs Jonker, University of Twente
  • Maura Pintor, University of Cagliari
  • Mauro Conti, University of Padua, Italy
  • Meisam Mohammady, Iowa State University of Science and Technology, Iowa, The USA
  • Melek Önen, EURECOM
  • Meng Luo, Zhejiang University
  • Mengyuan Li, MIT
  • Mert Pesé, Clemson University
  • Michael Schwarz, CISPA Helmholtz Center for Information Security
  • Michael Waidner, Fraunhofer SIT and TU Darmstadt
  • Michail Maniatakos, NYU Abu Dhabi
  • Michele Orrù, University of Berkeley / Sorbonne University
  • Michelle Yeo, IST Austria
  • Ming Li, The University of Texas at Arlington
  • Minxin Du, Chinese University of Hong Kong
  • Mohammad Ghasemisharif, Palo Alto Networks
  • Mohannad Alhanahnah, University of Wisconsin Madison
  • Mohsen Lesani, University of California, Riverside
  • Moritz Lipp, Amazon Web Services
  • Mridula Singh, CISPA
  • Mu Zhang, University of Utah
  • Muhammed F. Esgin, Monash University
  • Muoi Tran, ETH Zurich
  • Murat Kantarcioglu, UT Dallas
  • Nader Sehatbakhsh, UCLA
  • Nalin Arachchilage, University of Auckland
  • Neetesh Saxena, Cardiff University
  • Neil Gong, Duke University
  • Ngoc Khanh Nguyen, King’s College
  • Nick Hopper, University of Minnesota
  • Nick Nikiforakis, Stony Brook University
  • Nidhi Rastogi, Rochester Institute of Technology
  • Niloofar Mireshghallah, University of Washington
  • Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
  • Ning Zhang, Washington University in St. Louis
  • Norrathep Rattanavipanon, Prince of Songkla University
  • Oana Goga, CNRS
  • Oleksii Oleksenko, Microsoft Research Cambridge
  • Olga Ohrimenko, The University of Melbourne
  • Olivier Blazy, École Polytechnique, France
  • Panagiotis Ilia, Cyprus University of Technology
  • Pedro Moreno-Sanchez, IMDEA Software Institute
  • Peeter Laud, Cybernetica AS
  • Peisen Yao, Zhejiang University
  • Peng Gao, Virginia Tech, Department of Computer Science
  • Peter Ga_i, IOG
  • Petr Svenda, Masaryk University
  • Phani Vadrevu, Louisiana State University
  • Pierre Laperdrix, CNRS
  • Piotr Mardziel, Carnegie Mellon University
  • Piyush Kumar Sharma, University of Michigan
  • Pramod Bhatotia, TU Munich
  • Pratyay Mukherjee, Supra Research
  • Qi Li, Tsinghua University
  • Qiang Tang, Luxembourg Institute of Science and Technology (LIST)
  • Qiang Tang, The University of Sydney
  • Qiang Zeng, George Mason University
  • Qiben Yan, MSU
  • Qichen Wang, Hong Kong Baptist University
  • Qingkai Shi, Nanjing University
  • Raouf Kerkouche, The CISPA Helmholtz Center for Information Security
  • Reihaneh Savafi-Naini, University of Calgary
  • Reza Shokri, NUS
  • Riccardo Lazzeretti, Sapienza University of Rome
  • Riccardo Spolaor, Shandong University
  • Roberto Perdisci, University of Georgia
  • Roger Piqueras Jover, Google
  • Rongmao Chen, National University of Defense Technology
  • Rosario Gennaro, City College, CUNY
  • Rui Wen, CISPA Helmholtz Center for Information Security
  • Ruimin Sun, Florida International University
  • Ruoxi Sun, CSIRO’s Data61
  • Ruoyu Wang, Arizona State University
  • Ruxandra Olimid, NTNU and University of Bucharest
  • Ryan Henry, University of Calgary
  • Ryan Kastner, University of California, San Diego
  • Ryan Wails, Georgetown University, U.S. Naval Research Laboratory
  • Ryo Nishimaki, NTT Social Informatics Laboratories
  • Sadia Afroz, ICSI, Avast
  • Saeed Mahloujifar, Meta
  • Saeed Sharifi-Malvajerdi, Toyota Technological Institute at Chicago
  • Saikrishna Badrinarayanan, LinkedIn
  • Saman Zonouz, Georgia Tech
  • Samira Ajorpaz Mirbagher, North Carolina State University
  • Sanchuan Chen, Auburn University
  • Sandeep Pisharody, MIT Lincoln Laboratory
  • Sang Kil Cha, KAIST
  • Sanghyun Hong, Oregon State University
  • Santiago Torres-Arias, Purdue University
  • Santiago Zanella-Beguelin, Microsoft
  • Savino Dambra, Norton Research Group
  • Savvas Zannettou, TU Delft
  • Sebastian Koehler, University of Oxford
  • Sébastien Canard, Télécom Paris
  • Sebastien Gambs, University of Quebec in Montreal
  • Selcuk Uluagac, Florida International University
  • Sen Chen, Tianjin University
  • Sepideh Ghanavati, University of Maine
  • Sergiu Carpov, Inpher
  • Shagufta Mehnaz, Penn State University
  • Shangwen Wang, National University of Defense Technology
  • Shengjian (Daniel) Guo, AWS Proactive Security
  • Shiqing Ma, University of Massachusetts Amherst
  • Shirin Nilizadeh, The University of Texas at Arlington
  • Shiyi Wei, University of Texas at Dallas
  • Shouling Ji, Zhejiang University
  • Shravan Srinivasan, Lagrange Labs
  • Shufan Zhang, University of Waterloo
  • Shweta Shinde, ETH Zurich
  • Siamak F. Shahandashti, University of York
  • Simon Koch, Institute for Application Security (TU-Braunschweig)
  • Simon Oya, The University of British Columbia
  • Sisi Duan, Tsinghua University
  • Soheil Khodayari, CISPA Helmholtz Center for Information Security
  • Solmaz Salimi, Eurecom
  • Song Fang, University of Oklahoma
  • Soteris Demetriou, Imperial College London
  • Sourav Das, UIUC
  • Sri Aravinda Krishnan Thyagarajan, NTT Research
  • Srinivasan Raghuraman, Visa Research and MIT
  • Stefan Katzenbeisser, University of Passau
  • Stefan Mangard, Graz University of Technology
  • Stefan Nagy, University of Utah
  • Stefan Schmid, TU Berlin
  • Stefanie Roos, TU Delft
  • Stefano Calzavara, Università Ca’ Foscari Venezia
  • Stefano Zanero, Politecnico di Milano
  • Stephan Krenn, Austrian Institute of Technology
  • Stéphanie Delaune, CNRS
  • Stephen Herwig, William & Mary
  • Stephen McQuistin, University of St Andrews
  • Suman Jana, Columbia University
  • Swarn Priya, Virginia Tech
  • Syed Rafiul Hussain, Pennsylvania State University
  • Taegyu Kim, Pennsylvania State University
  • Takao Murakami, ISM
  • Tao Wang, Simon Fraser University
  • Tapas Pal, NTT Corporation
  • Tarik Moataz, MongoDB
  • Tariq Elahi, University of Edinburgh
  • Tatsuya Mori, Waseda University
  • Thomas Eisenbarth, University of Lübeck
  • Thomas Schneider, TU Darmstadt
  • Thomas Unterluggauer, Intel labs
  • Thorsten Strufe, Karlsruhe Institute of Technology
  • Tianhao Wang, University of Virginia
  • Ting Wang, Stony Brook University
  • Tingmin Wu, CSIRO’s Data61
  • Tjerand Silde, Norwegian University of Science and Technology
  • Tobias Fiebig, Max-Planck Insitut for Informatics
  • Tom Chotia, University of Birmingham
  • Tom Van Goethem, KU Leuven / Google
  • Trung Tin Nguyen, CISPA Helmholtz Center for Information Security, Saarland University
  • Tu Le, UC Irvine
  • Umar Iqbal, Washington University in St. Louis
  • Urbi Chatterjee, IIT Kanpur
  • Valeria Nikolaenko, Facebook Calibra
  • Vanessa Teague, Thinking Cybersecurity
  • Varun Chandrasekaran, University of Wisconsin-Madison
  • Vasileios Kemerlis, Brown University
  • Vasily Sartakov, Imperial College London
  • Vera Rimmer, imec-DistriNet, KU Leuven
  • Vero Estrada, EPFL
  • Wei Huang, University of Toronto
  • Wei Meng, CUHK
  • Wei Sun, University of California San Diego
  • Wei You, Renmin University of China
  • Weijia He, Dartmouth College
  • Weiteng Chen, Microsoft Research, Redmond
  • Wenbo Guo, UCSB
  • Wenbo Shen, Zhejiang University
  • Wenrui Diao, Shandong University
  • Wouter Lueks, CISPA
  • Xi He, University of Waterloo
  • Xiangkun Jia, Institute of Software Chinese Academy of Sciences
  • Xiangyu Zhang, Purdue University
  • Xiao Zhang, CISPA Helmholtz Center for Information Security
  • Xiaojing Liao, Indiana University Bloomington
  • Xiaokuan Zhang, George Mason University
  • Xiaokui Xiao, NUS
  • Xiaolin Xu, Northeastern University
  • Xiaoyu Ji, Zhejiang University
  • Xiapu Luo, The Hong Kong Polytechnic University
  • Xin Yuan, CSIRO
  • Xing Gao, University of Delaware
  • Xingwei Lin, Ant Group
  • Xinwen Fu, University of Massachusetts Lowell
  • Xuechao Wang, HKUST(GZ)
  • Xueqiang Wang, University of Central Florida
  • Xusheng Xiao, Arizona State University
  • Yajin Zhou, Zhejiang University
  • Yan Meng, Shanghai Jiao Tong University
  • Yan Shvartzshnaider, York University
  • Yang Zhang, CISPA Helmholtz Center for Information Security
  • Yanjiao Chen, Zhejiang University
  • Yanxue Jia, Purdue University
  • Yash Vekaria, University of California, Davis
  • Yaxing Yao, Virginia Tech
  • Yiannis Tselekounis, Royal Holloway, University of London (RHUL)
  • Yibin Yang, Georgia Institute of Technology
  • Yinqian Zhang, Southern University of Science and Technology (SUSTech)
  • Yinzhi Cao, Johns Hopkins
  • Yixin Zou, Max-Planck Insitut for Security and Privacy
  • Yomna Nasser, Google
  • Yonghwi Kwon, University of Maryland
  • Yousra Aafer, University of Waterloo
  • Yu Ding, Google Research
  • Yu Feng, University of California, Santa Barbara
  • Yu Jiang, Tsinghua University
  • Yuan Hong, University of Connecticut
  • Yuan Lu, Institute of Software Chinese Academy of Sciences
  • Yuan Tian, UCLA
  • Yuan Zhang, Fudan University
  • Yuandao Cai, Huawei
  • Yue Duan, Singapore Management University
  • Yue Zhang, Drexel University
  • Yuekang Li, University of New South Wales
  • Yuhong Nan, Sun Yat-sen University
  • Yun Lu, University of Victoria
  • Yuriy Polyakov, Duality Technologies
  • Yuseok Jeon, Ulsan National Institute of Science and Technology (UNIST)
  • Z. Berkay Celik, Purdue University
  • Zahra Tarkhani, Microsoft
  • Zeta Avarikioti, TU Wien
  • Zhan Qin, Zhejiang University
  • Zhen Huang, De Paul University
  • Zhen Ling, Southeast University
  • Zhenkai Zhang, Clemson University
  • Zhihao (Zephyr) Yao, New Jersey Institute of Technology
  • Zhikun Zhang, Stanford & CISPA
  • Zhiqiang Lin, Ohio State University
  • Zhongjie Ba, Zhejiang University
  • Zhuo Zhang, Purdue University
  • Zhuotao Liu, Tsinghua University
  • Zichen Gui, ETH Zürich
  • Ziming Zhao, University at Buffalo
  • Ziqiao Zhou, MSR Redmond