Organizers

Artifact Evaluation co-Chairs

Contact the AEC chairs at sec24aec@usenix.org.

Artifact Evaluation Publication Chair

Artifact Evaluation Committee

  • Bhupendra Acharya, CISPA Helmholtz Center for Information Security
  • Shubham Agarwal, CISPA Helmholtz Center for Information Security
  • Ayomide Akinsanya, Stevens Institute of Technology
  • Ruba Alsmadi, Louisiana State University
  • Jessy Ayala, University of California, Irvine
  • Alessandro Baccarini, University at Buffalo
  • Xuesong Bai, University of California, Irvine
  • David Balash, University of Richmond
  • Luca Baldesi, University of California, Irvine
  • Hannaneh Barahouei Pasandi, University of California, Berkeley
  • Yohan Beugin, University of Wisconsin—Madison
  • Evangelos Bitsikas, Northeastern University
  • Jakob Bleier, Technische Universität Wien
  • Clemens-Alexander Brust, DLR Institute of Data Science
  • Jiahao Cao, Tsinghua University
  • Yuanhaur Chang, Washington University in St. Louis
  • Mohamed Hashim Changrampadi, Chalmers University of Technology
  • Kevin Cheang, Amazon Web Services
  • Chen Chen, Texas A&M University
  • Wei Chen, The Hong Kong University of Science and Technology
  • Xiaoqi Chen, Princeton University
  • Yanzuo Chen, The Hong Kong University of Science and Technology
  • Yongting Chen, New York University Shanghai
  • Mingfei Cheng, Singapore Management University
  • Pascal Cotret, ENSTA Bretagne
  • Jian Cui, Indiana University Bloomington
  • Giulio De Pasquale, King’s College London
  • Zizhuang Deng, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences
  • Aolin Ding, Accenture Labs
  • Antreas Dionysiou, University of Cyprus
  • Tian Dong, Shanghai Jiao Tong University
  • Hossam ElAtali, University of Waterloo
  • Yuzhou Fang, University of Southern California
  • Yusi Feng, University of Chinese Academy of Sciences
  • Christof Ferreira Torres, ETH Zurich
  • Gertjan Franken, DistriNet, KU Leuven
  • Chuanpu Fu, Tsinghua University
  • Alexander Gaidis, Brown University
  • Lukas Gerlach, CISPA Helmholtz Center for Information Security
  • Shlok Gilda, University of Florida
  • Ravi Prakash Giri, Meta
  • Sindhu Reddy Kalathur Gopal, University of Wyoming
  • Sanket Goutam, Stony Brook University
  • Ziyi Guo, Northwestern University
  • Florian Hantke, CISPA Helmholtz Center for Information Security
  • Keno Hassler, CISPA Helmholtz Center for Information Security
  • Haojie He, Shanghai Jiao Tong University
  • Ningyu He, Peking University
  • Yi He, Tsinghua University
  • Tiago Heinrich, Federal University of Paraná
  • Hailong Hu, University of Luxembourg
  • Hongsheng Hu, CSIRO’s Data61
  • Jingmei Hu, Amazon
  • Shengtuo Hu, ByteDance
  • Zhenghao Hu, New York University
  • Long Huang, Louisiana State University
  • Qiqing Huang, University at Buffalo
  • Alfusainey Jallow, CISPA Helmholtz Center for Information Security
  • Yilin Ji, Karlsruhe Institute of Technology
  • Hao Jin, Texas A&M University
  • Yibo Jin, The Hong Kong University of Science and Technology
  • Jonas Juffinger, Graz University of Technology
  • Joseph Khoury, Louisiana State University
  • Soomin Kim, Korea Advanced Institute of Science and Technology (KAIST)
  • Sungwoo Kim, Purdue University
  • Konstantinos Kleftogiorgos, Stevens Institute of Technology
  • Torsten Krauß, University of Würzburg
  • John Kressel, University of Manchester
  • Tu Le, University of California, Irvine
  • Seongmin Lee, Max Planck Institute for Security and Privacy
  • Caihua Li, Yale University
  • Peiyang Li, Tsinghua University
  • Penghui Li, The Chinese University of Hong Kong
  • Zihao Li, The Hong Kong Polytechnic University
  • Han Liu, Washington University in St. Louis
  • Jing Liu, University of California, Irvine
  • Jinhong Liu, Zhejiang University
  • Shigang Liu, Swinburne University of Technology
  • Zhengyang Liu, University of Utah
  • Eman Maali, Imperial College London
  • Noah Mauthe, CISPA Helmholtz Center for Information Security
  • Atefeh Mohseni Ejiyeh, University of California, Santa Barbara
  • Kunal Mukherjee, The University of Texas at Dallas
  • Hoang Dai Nguyen, Louisiana State University
  • Abdun Nihaal, Indian Institute of Technology Madras
  • Xiaoyi Pang, Zhejiang University
  • Eric Pauley, University of Wisconsin—Madison
  • Deepak Pillai, University of Adelaide
  • Imranur Rahman, North Carolina State University
  • Mirza Masfiqur Rahman, Purdue University
  • Vidya Lakshmi Rajagopalan, Stevens Institute of Technology
  • Prashant Rajput, New York University Abu Dhabi
  • Jenni Reuben
  • Ritik Roongta, New York University
  • Zain Ruan, Massachusetts Institute of Technology
  • Abhinaya S.B., North Carolina State University
  • Mohammad Hammas Saeed, Boston University
  • Amit Samanta, University of Utah
  • Fan Sang, Georgia Institute of Technology
  • Benedict Schlüter, ETH Zurich
  • Till Schlüter, CISPA Helmholtz Center for Information Security
  • Christoph Sendner, University of Würzburg
  • Amir Shahatit, New York University
  • Salvatore Signorello, Telefonica Research
  • Sachin Kumar Singh, University of Utah
  • Johnny So, Stony Brook University
  • Avinash Sudhodanan, HUMAN Security
  • Yuqiang Sun, Nanyang Technological University
  • Leon Trampert, CISPA Helmholtz Center for Information Security
  • Billy Tsouvalas, Stony Brook University
  • Arturo Villacañas, CISPA Helmholtz Center for Information Security
  • Kevin van Liebergen, IMDEA Software Institute
  • Ryan Vrecenar, Sandia National Laboratories
  • Jinwen Wang, Washington University in St. Louis
  • Feng Wei, University at Buffalo
  • Shujiang Wu, F5
  • Yuhao Wu, Washington University in St. Louis
  • Qi Xia, The University of Texas at San Antonio
  • Jiacen Xu, University of California, Irvine
  • Jinyan Xu, Zhejiang University
  • Yibin Xu, University of Copenhagen
  • Jiongchi Yu, Singapore Management University
  • Zheng Yu, Northwestern University
  • Bowen Zhang, The Hong Kong University of Science and Technology
  • Kunsong Zhao, The Hong Kong Polytechnic University
  • Jingyao Zhang, University of California, Riverside
  • Menghao Zhang, Tsinghua University
  • Mengya Zhang, The Ohio State University
  • Qifan Zhang, University of California, Irvine
  • Ruiyi Zhang, CISPA Helmholtz Center for Information Security
  • Yifan Zhang, Indiana University Bloomington
  • Zhiyu Zhang, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences
  • Zhiyuan Zhang, The University of Melbourne
  • Yu Zheng, The Chinese University of Hong Kong
  • Chenyu Zhou, University of Southern California
  • Kyrie Zhou, University of Illinois at Urbana–Champaign
  • Man Zhou, Huazhong University of Science and Technology
  • Xia Zhou, Zhejiang University
  • Xugui Zhou, University of Virginia
  • Yi Zhou, Carnegie Mellon University