Organizers
Artifact Evaluation co-Chairs
- Anjo Vahldiek-Oberwagner, Intel Labs
- Phani Vadrevu, Louisiana State University
Contact the AEC chairs at sec24aec@usenix.org.
Artifact Evaluation Publication Chair
- Victor Le Pochat, KU Leuven
Artifact Evaluation Committee
- Bhupendra Acharya, CISPA Helmholtz Center for Information Security
- Shubham Agarwal, CISPA Helmholtz Center for Information Security
- Ayomide Akinsanya, Stevens Institute of Technology
- Ruba Alsmadi, Louisiana State University
- Jessy Ayala, University of California, Irvine
- Alessandro Baccarini, University at Buffalo
- Xuesong Bai, University of California, Irvine
- David Balash, University of Richmond
- Luca Baldesi, University of California, Irvine
- Hannaneh Barahouei Pasandi, University of California, Berkeley
- Yohan Beugin, University of Wisconsin—Madison
- Evangelos Bitsikas, Northeastern University
- Jakob Bleier, Technische Universität Wien
- Clemens-Alexander Brust, DLR Institute of Data Science
- Jiahao Cao, Tsinghua University
- Yuanhaur Chang, Washington University in St. Louis
- Mohamed Hashim Changrampadi, Chalmers University of Technology
- Kevin Cheang, Amazon Web Services
- Chen Chen, Texas A&M University
- Wei Chen, The Hong Kong University of Science and Technology
- Xiaoqi Chen, Princeton University
- Yanzuo Chen, The Hong Kong University of Science and Technology
- Yongting Chen, New York University Shanghai
- Mingfei Cheng, Singapore Management University
- Pascal Cotret, ENSTA Bretagne
- Jian Cui, Indiana University Bloomington
- Giulio De Pasquale, King’s College London
- Zizhuang Deng, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences
- Aolin Ding, Accenture Labs
- Antreas Dionysiou, University of Cyprus
- Tian Dong, Shanghai Jiao Tong University
- Hossam ElAtali, University of Waterloo
- Yuzhou Fang, University of Southern California
- Yusi Feng, University of Chinese Academy of Sciences
- Christof Ferreira Torres, ETH Zurich
- Gertjan Franken, DistriNet, KU Leuven
- Chuanpu Fu, Tsinghua University
- Alexander Gaidis, Brown University
- Lukas Gerlach, CISPA Helmholtz Center for Information Security
- Shlok Gilda, University of Florida
- Ravi Prakash Giri, Meta
- Sindhu Reddy Kalathur Gopal, University of Wyoming
- Sanket Goutam, Stony Brook University
- Ziyi Guo, Northwestern University
- Florian Hantke, CISPA Helmholtz Center for Information Security
- Keno Hassler, CISPA Helmholtz Center for Information Security
- Haojie He, Shanghai Jiao Tong University
- Ningyu He, Peking University
- Yi He, Tsinghua University
- Tiago Heinrich, Federal University of Paraná
- Hailong Hu, University of Luxembourg
- Hongsheng Hu, CSIRO’s Data61
- Jingmei Hu, Amazon
- Shengtuo Hu, ByteDance
- Zhenghao Hu, New York University
- Long Huang, Louisiana State University
- Qiqing Huang, University at Buffalo
- Alfusainey Jallow, CISPA Helmholtz Center for Information Security
- Yilin Ji, Karlsruhe Institute of Technology
- Hao Jin, Texas A&M University
- Yibo Jin, The Hong Kong University of Science and Technology
- Jonas Juffinger, Graz University of Technology
- Joseph Khoury, Louisiana State University
- Soomin Kim, Korea Advanced Institute of Science and Technology (KAIST)
- Sungwoo Kim, Purdue University
- Konstantinos Kleftogiorgos, Stevens Institute of Technology
- Torsten Krauß, University of Würzburg
- John Kressel, University of Manchester
- Tu Le, University of California, Irvine
- Seongmin Lee, Max Planck Institute for Security and Privacy
- Caihua Li, Yale University
- Peiyang Li, Tsinghua University
- Penghui Li, The Chinese University of Hong Kong
- Zihao Li, The Hong Kong Polytechnic University
- Han Liu, Washington University in St. Louis
- Jing Liu, University of California, Irvine
- Jinhong Liu, Zhejiang University
- Shigang Liu, Swinburne University of Technology
- Zhengyang Liu, University of Utah
- Eman Maali, Imperial College London
- Noah Mauthe, CISPA Helmholtz Center for Information Security
- Atefeh Mohseni Ejiyeh, University of California, Santa Barbara
- Kunal Mukherjee, The University of Texas at Dallas
- Hoang Dai Nguyen, Louisiana State University
- Abdun Nihaal, Indian Institute of Technology Madras
- Xiaoyi Pang, Zhejiang University
- Eric Pauley, University of Wisconsin—Madison
- Deepak Pillai, University of Adelaide
- Imranur Rahman, North Carolina State University
- Mirza Masfiqur Rahman, Purdue University
- Vidya Lakshmi Rajagopalan, Stevens Institute of Technology
- Prashant Rajput, New York University Abu Dhabi
- Jenni Reuben
- Ritik Roongta, New York University
- Zain Ruan, Massachusetts Institute of Technology
- Abhinaya S.B., North Carolina State University
- Mohammad Hammas Saeed, Boston University
- Amit Samanta, University of Utah
- Fan Sang, Georgia Institute of Technology
- Benedict Schlüter, ETH Zurich
- Till Schlüter, CISPA Helmholtz Center for Information Security
- Christoph Sendner, University of Würzburg
- Amir Shahatit, New York University
- Salvatore Signorello, Telefonica Research
- Sachin Kumar Singh, University of Utah
- Johnny So, Stony Brook University
- Avinash Sudhodanan, HUMAN Security
- Yuqiang Sun, Nanyang Technological University
- Leon Trampert, CISPA Helmholtz Center for Information Security
- Billy Tsouvalas, Stony Brook University
- Arturo Villacañas, CISPA Helmholtz Center for Information Security
- Kevin van Liebergen, IMDEA Software Institute
- Ryan Vrecenar, Sandia National Laboratories
- Jinwen Wang, Washington University in St. Louis
- Feng Wei, University at Buffalo
- Shujiang Wu, F5
- Yuhao Wu, Washington University in St. Louis
- Qi Xia, The University of Texas at San Antonio
- Jiacen Xu, University of California, Irvine
- Jinyan Xu, Zhejiang University
- Yibin Xu, University of Copenhagen
- Jiongchi Yu, Singapore Management University
- Zheng Yu, Northwestern University
- Bowen Zhang, The Hong Kong University of Science and Technology
- Kunsong Zhao, The Hong Kong Polytechnic University
- Jingyao Zhang, University of California, Riverside
- Menghao Zhang, Tsinghua University
- Mengya Zhang, The Ohio State University
- Qifan Zhang, University of California, Irvine
- Ruiyi Zhang, CISPA Helmholtz Center for Information Security
- Yifan Zhang, Indiana University Bloomington
- Zhiyu Zhang, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences
- Zhiyuan Zhang, The University of Melbourne
- Yu Zheng, The Chinese University of Hong Kong
- Chenyu Zhou, University of Southern California
- Kyrie Zhou, University of Illinois at Urbana–Champaign
- Man Zhou, Huazhong University of Science and Technology
- Xia Zhou, Zhejiang University
- Xugui Zhou, University of Virginia
- Yi Zhou, Carnegie Mellon University