Organizers
Artifact Evaluation co-Chairs
- Anjo Vahldiek-Oberwagner, Intel Labs
 - Phani Vadrevu, Louisiana State University
 
Contact the AEC chairs at sec24aec@usenix.org.
Artifact Evaluation Publication Chair
- Victor Le Pochat, KU Leuven
 
Artifact Evaluation Committee
- Bhupendra Acharya, CISPA Helmholtz Center for Information Security
 - Shubham Agarwal, CISPA Helmholtz Center for Information Security
 - Ayomide Akinsanya, Stevens Institute of Technology
 - Ruba Alsmadi, Louisiana State University
 - Jessy Ayala, University of California, Irvine
 - Alessandro Baccarini, University at Buffalo
 - Xuesong Bai, University of California, Irvine
 - David Balash, University of Richmond
 - Luca Baldesi, University of California, Irvine
 - Hannaneh Barahouei Pasandi, University of California, Berkeley
 - Yohan Beugin, University of Wisconsin—Madison
 - Evangelos Bitsikas, Northeastern University
 - Jakob Bleier, Technische Universität Wien
 - Clemens-Alexander Brust, DLR Institute of Data Science
 - Jiahao Cao, Tsinghua University
 - Yuanhaur Chang, Washington University in St. Louis
 - Mohamed Hashim Changrampadi, Chalmers University of Technology
 - Kevin Cheang, Amazon Web Services
 - Chen Chen, Texas A&M University
 - Wei Chen, The Hong Kong University of Science and Technology
 - Xiaoqi Chen, Princeton University
 - Yanzuo Chen, The Hong Kong University of Science and Technology
 - Yongting Chen, New York University Shanghai
 - Mingfei Cheng, Singapore Management University
 - Pascal Cotret, ENSTA Bretagne
 - Jian Cui, Indiana University Bloomington
 - Giulio De Pasquale, King’s College London
 - Zizhuang Deng, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences
 - Aolin Ding, Accenture Labs
 - Antreas Dionysiou, University of Cyprus
 - Tian Dong, Shanghai Jiao Tong University
 - Hossam ElAtali, University of Waterloo
 - Yuzhou Fang, University of Southern California
 - Yusi Feng, University of Chinese Academy of Sciences
 - Christof Ferreira Torres, ETH Zurich
 - Gertjan Franken, DistriNet, KU Leuven
 - Chuanpu Fu, Tsinghua University
 - Alexander Gaidis, Brown University
 - Lukas Gerlach, CISPA Helmholtz Center for Information Security
 - Shlok Gilda, University of Florida
 - Ravi Prakash Giri, Meta
 - Sindhu Reddy Kalathur Gopal, University of Wyoming
 - Sanket Goutam, Stony Brook University
 - Ziyi Guo, Northwestern University
 - Florian Hantke, CISPA Helmholtz Center for Information Security
 - Keno Hassler, CISPA Helmholtz Center for Information Security
 - Haojie He, Shanghai Jiao Tong University
 - Ningyu He, Peking University
 - Yi He, Tsinghua University
 - Tiago Heinrich, Federal University of Paraná
 - Hailong Hu, University of Luxembourg
 - Hongsheng Hu, CSIRO’s Data61
 - Jingmei Hu, Amazon
 - Shengtuo Hu, ByteDance
 - Zhenghao Hu, New York University
 - Long Huang, Louisiana State University
 - Qiqing Huang, University at Buffalo
 - Alfusainey Jallow, CISPA Helmholtz Center for Information Security
 - Yilin Ji, Karlsruhe Institute of Technology
 - Hao Jin, Texas A&M University
 - Yibo Jin, The Hong Kong University of Science and Technology
 - Jonas Juffinger, Graz University of Technology
 - Joseph Khoury, Louisiana State University
 - Soomin Kim, Korea Advanced Institute of Science and Technology (KAIST)
 - Sungwoo Kim, Purdue University
 - Konstantinos Kleftogiorgos, Stevens Institute of Technology
 - Torsten Krauß, University of Würzburg
 - John Kressel, University of Manchester
 - Tu Le, University of California, Irvine
 - Seongmin Lee, Max Planck Institute for Security and Privacy
 - Caihua Li, Yale University
 - Peiyang Li, Tsinghua University
 - Penghui Li, The Chinese University of Hong Kong
 - Zihao Li, The Hong Kong Polytechnic University
 - Han Liu, Washington University in St. Louis
 - Jing Liu, University of California, Irvine
 - Jinhong Liu, Zhejiang University
 - Shigang Liu, Swinburne University of Technology
 - Zhengyang Liu, University of Utah
 - Eman Maali, Imperial College London
 - Noah Mauthe, CISPA Helmholtz Center for Information Security
 - Atefeh Mohseni Ejiyeh, University of California, Santa Barbara
 - Kunal Mukherjee, The University of Texas at Dallas
 - Hoang Dai Nguyen, Louisiana State University
 - Abdun Nihaal, Indian Institute of Technology Madras
 - Xiaoyi Pang, Zhejiang University
 - Eric Pauley, University of Wisconsin—Madison
 - Deepak Pillai, University of Adelaide
 - Imranur Rahman, North Carolina State University
 - Mirza Masfiqur Rahman, Purdue University
 - Vidya Lakshmi Rajagopalan, Stevens Institute of Technology
 - Prashant Rajput, New York University Abu Dhabi
 - Jenni Reuben
 - Ritik Roongta, New York University
 - Zain Ruan, Massachusetts Institute of Technology
 - Abhinaya S.B., North Carolina State University
 - Mohammad Hammas Saeed, Boston University
 - Amit Samanta, University of Utah
 - Fan Sang, Georgia Institute of Technology
 - Benedict Schlüter, ETH Zurich
 - Till Schlüter, CISPA Helmholtz Center for Information Security
 - Christoph Sendner, University of Würzburg
 - Amir Shahatit, New York University
 - Salvatore Signorello, Telefonica Research
 - Sachin Kumar Singh, University of Utah
 - Johnny So, Stony Brook University
 - Avinash Sudhodanan, HUMAN Security
 - Yuqiang Sun, Nanyang Technological University
 - Leon Trampert, CISPA Helmholtz Center for Information Security
 - Billy Tsouvalas, Stony Brook University
 - Arturo Villacañas, CISPA Helmholtz Center for Information Security
 - Kevin van Liebergen, IMDEA Software Institute
 - Ryan Vrecenar, Sandia National Laboratories
 - Jinwen Wang, Washington University in St. Louis
 - Feng Wei, University at Buffalo
 - Shujiang Wu, F5
 - Yuhao Wu, Washington University in St. Louis
 - Qi Xia, The University of Texas at San Antonio
 - Jiacen Xu, University of California, Irvine
 - Jinyan Xu, Zhejiang University
 - Yibin Xu, University of Copenhagen
 - Jiongchi Yu, Singapore Management University
 - Zheng Yu, Northwestern University
 - Bowen Zhang, The Hong Kong University of Science and Technology
 - Kunsong Zhao, The Hong Kong Polytechnic University
 - Jingyao Zhang, University of California, Riverside
 - Menghao Zhang, Tsinghua University
 - Mengya Zhang, The Ohio State University
 - Qifan Zhang, University of California, Irvine
 - Ruiyi Zhang, CISPA Helmholtz Center for Information Security
 - Yifan Zhang, Indiana University Bloomington
 - Zhiyu Zhang, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences
 - Zhiyuan Zhang, The University of Melbourne
 - Yu Zheng, The Chinese University of Hong Kong
 - Chenyu Zhou, University of Southern California
 - Kyrie Zhou, University of Illinois at Urbana–Champaign
 - Man Zhou, Huazhong University of Science and Technology
 - Xia Zhou, Zhejiang University
 - Xugui Zhou, University of Virginia
 - Yi Zhou, Carnegie Mellon University