Organizers
Artifact Evaluation co-Chairs
- Aurore Fass, Inria Centre at Université Côte d’Azur
- Christian Wressnegger, Karlsruhe Institute of Technology
- Deepak Kumar, University of California San Diego
Contact the AEC chairs at sec26aec@usenix.org.
Artifact Evaluation Publication Chair
- Tiago Heinrich, Max-Planck-Institut für Informatik
Artifact Evaluation Committee (Full-term)
- Abdullah Al Ishtiaq, The Pennsylvania State University
- Ahmed Lekssays, Qatar Computing Research Institute
- Alessandro Baccarini, Input Output
- Ameer Kashani Ameer Kashani, DENSO
- Amit Samanta, University of Utah
- Amit Singha, Purdue University
- Anish Chand, Louisiana State University
- Annika Wilde, Ruhr University Bochum
- Antonio Muñoz, University of Malaga
- Arman Riasi, Virginia Tech
- Arshia Arya, University of California, San Diego
- Arturo Villacañas, Independent researcher
- Ashish Kumar, Penn State University
- Atefeh Mohseni-Ejiyeh, UC Santa Barbara, Harness
- Bernd Gruner, German Aerospace Center (DLR)
- Binhao Ma, University of Missouri–Kansas City
- Bo Zhang, Northwestern Polytechnical University
- Bocheng Chen, the University of Mississippi
- Bonan Ruan, National University of Singapore
- Boru Chen, University of California, Berkeley
- Bosi Zhang, Huazhong University of Science and Technology
- Chamikara M.A.P., CSIRO’s Data61
- Changming Liu, Google
- Chenkai Wang, University of Illinois Urbana-Champaign
- Chenyi Wang, University of Arizona
- Corban Villa, UC Berkeley
- Dañiel Gerhardt, CISPA Helmholtz Center for Information Security
- Daniel Pöllmann, ETH Zurich & Lucerne University of Applied Sciences and Arts
- David Pape, CISPA Helmholtz Center for Information Security
- Devansh Srivastav, CISPA Helmholtz Center for Information Security
- Dominic Troppmann, CISPA Helmholtz Center for Information Security
- Dongwook Kim, Yonsei University
- Ehsanul Kabir, Penn State University
- Elizabeth Lin, North Carolina State University
- Eric Ackermann, CISPA
- Eric García Arribas, TU Graz
- Fabian Bäumer, Ruhr University Bochum
- Fabian Fleischer, Georgia Institute of Technology
- Fabian Thomas, CISPA Helmholtz Center for Information Security
- Fariba Osali, Max Planck Institute for Informatics
- Federico Mazzone, University of Twente
- Felix Lange, Paderborn University
- Feng Luo, The Hong Kong Polytechnic University
- Florian Roudot, Univ Rennes
- Fujiao Ji, University of Tennessee, Knoxville
- Giuseppe Parrella, University of Salerno
- Guilhem Lacombe, VERIMAG, Université Grenoble-Alpes
- Guillaume DIDIER, Universität des Saarlandes
- Guofeng Tang, Singapore Management University
- Guruprasad Viswanathan Ramesh, University of Wisconsin-Madison
- Gwihwan Go, Tsinghua University
- Hamza Mouhcine, Qatar Computing Research Institute
- Haodi Zou, University of California San Diego
- Hassan El Alami, Howard University
- Hocheol Nam, KAIST
- Hongsheng Hu, University of Newcastle
- Hongyan CHANG, MBZUAI
- Huiyun Peng, Purdue University
- Iman Alipour, Max Planck Institute for Informatics
- Ismat Jarin, University of California, Irvine
- Jan Drescher, TU Braunschweig
- Jean-Charles Noirot Ferrand, University of Wisconsin-Madison
- Jiahao Cao, Tsinghua University
- Jiahao Yu, Northwestern University
- Jian Cui, University of Illinois Urbana-Champaign
- Jiangrui Yu, Peking University
- Jiate Li, University of Southern California
- Jie Fu, Stevens Institute of Technology
- Jie Ma, Beihang University
- Jinan Jiang, The Hong Kong Polytechnic University
- Jinhao Zhu, UC Berkeley
- Jinseo Lee, KAIST
- Jiongchi Yu, Singapore Management University
- Jiping Yu, Tsinghua University
- Jiwon Kim, Purdue University
- Jonas Mücke, TU Dresden
- Joseph Khoury, Louisiana State University
- Juefei Pu, University of California, Riverside
- Juhee Kim, Seoul National University
- Julian Funk, Friedrich-Alexander-Universität Erlangen-Nürnberg
- Junkai Liang, Peking University
- Junming Chen, George Mason University
- Junming Liu, MPI-SP
- Junqi Zhang, University of Science and Technology of China
- Junrui Liu, University of California, Santa Barbara
- Juyang Bai, Johns Hopkins University
- Kai Ma, Huazhong University of Science and Technology
- Kaixuan Luo, The Chinese University of Hong Kong
- Katharina Ceesay-Seitz, ETH Zurich
- Kelechi Kalu, Purdue University
- Keno Hassler, CISPA Helmholtz Center for Information Security
- Kevin Nam, Seoul National University
- Kunlin Li, The Hong Kong University of Science and Technology (Guangzhou)
- Kunsong Zhao, The Hong Kong Polytechnic University
- Kunyang Li, University of Wisconsin-Madison
- Kyungchan Lim, University of Maryland
- Leming Shen, The Hong Kong Polytechnic University
- Leonhard Balduf, TU Darmstadt
- Lihua Wang, The University of New South Wales
- Lipeng He, University of Waterloo
- Long Huang, University of Michigan
- Longxiang Wang, City University of Hong Kong
- Luca Wilke, Microsoft Research
- Mahmoud Khalifa, Prince Sultan University
- Malvika Jadhav, University of Florida
- Marcel Maehren, Ruhr University Bochum
- Marius Fleischer, NVIDIA
- Mathé Hertogh, VU Amsterdam
- Maynard Koch, TU Dresden
- Md Sadik Awal, Florida International University
- Mehtab Zafar, National University of Singapore
- Meng Chen, Zhejiang University
- Mengling LIU, The Hong Kong Polytechnic University
- Michele Guerra, New York University Abu Dhabi
- Michele Ianni, University of Calabria, Italy
- Mingming Zha, Indiana University Bloomington
- Mingyi Liu, Georgia Institute of Technology
- Minjun (Elena) Long, University of Virginia
- Mohamadreza Rostami, Technical University of Darmstadt
- Mugdha Khedkar, Heinz Nixdorf Institute, Paderborn University (Germany)
- Mughees Ur Rehman, Virginia Tech
- Muxi Lyu, UC Berkeley
- Nicola Bottura, Prisma s.r.l.
- Niklas Niere, Paderborn University
- Nima Naderloui, University of Connecticut
- Noah Mauthe, CISPA Helmholtz Center for Information Security
- Nurlan Nazaraliyev, University of California Riverside
- Paschalis Bekos, Stony Brook University
- Patrick Jattke, ETH Zurich
- Paul Chung, UC San Diego
- Paul OLIVIER, LAAS-CNRS
- Peiran Xu, UCLA
- Peiyang Li, Ant Group & Tsinghua University
- Philipp Beer, TU Wien
- Pratik M. Kamble, Binghamton University
- Puzhuo Liu, Ant Group & Tsinghua University
- Qing Deng, University of California, Riverside
- Qisheng Jiang, Duke University
- Rahul Kande, Advanced Micro Devices (AMD)
- Rajdeep Ghosh, Indian Institute of Technology, Kharagpur
- Ravan Nazaraliyev, University of California, Riverside
- Robin Kirchner, TU Braunschweig
- Ryan Vrecenar, Sandia National Laboratories
- Sachin Shukla, Microsoft
- Sachin Kumar Singh, University of Utah
- Sambhav Satija, University of Wisconsin-Madison
- Seoyoung Kweon, UC San Diego
- Sepehr Mirzaei, Saarland University
- Seungju Lee, Princeton University
- Shao-Yu Chu, UCSD
- Shayan Shabihi, University of Maryland, College Park
- Shenglong Yao, Georgia Institute of Technology
- Shengtuo Hu, Palo Alto Networks
- Shenyi Zhang, Wuhan University
- Shoupeng Ren, Zhejiang University
- Shubham Agarwal, Max Planck Institute for Security and Privacy
- Side Liu, Tulane University
- Siliang Qin, Institute of Information Engineering, Chinese Academy of Sciences
- Simin Chen, Columbia university
- Sofiane Azogagh, Université du Québec à Montréal
- Stanley Wu, University of Chicago
- Sungwoo Kim, Purdue University
- Taeung Yoon, University of Illinois Urbana Champaign
- Thom Wiggers, PQShield
- Tian Dong, The University of Hong Kong
- Tianshi Xu, Peking University
- Tingwei Zhang, Cornell Tech
- Tong Sun, Zhejiang University
- Tushar Nayan, Florida International University
- Vaishnavi Raghavajosyula, Max Planck Institute for Informatics
- Valentino Dalla Valle, CISPA Helmholtz Center for Information Security
- Verena Lachner, University of Innsbruck
- Vishnu Dasu, Pennsylvania State University
- Wanning Ding, Syracuse University
- Weiheng Bai, University of Minnesota
- Weikang Ding, University of Missouri-Kansas City
- Xia Zhou, Zhejiang University
- Xiang Li, George Mason University
- Xiang Zhang, Tianjin University
- Xiao Zhan, Universitat Politècnica de València & University of Cambridge
- Xiaohan Zhang, Fudan University
- Xiaoyue Ma, George Mason University
- Xijia Che, University of Illinois, Urbana-Champaign
- Xin Zhang, Peking University
- Xingyu Lyu, University of Massachusetts Lowell
- Xuanming Liu, Zhejiang University
- Yao Zhao, Victoria University
- Yaofei Wang, Hefei University of Technology
- Yassine Mekdad, Florida International University
- Ye Shu, UC San Diego
- Yi Zhou, Amazon Web Serivce
- Yibo Jin, The Hong Kong University of Science and Technology
- Yichen Liu, University of Illinois Urbana-Champaign
- Ying Li, University of California, Los Angeles
- Yiwei Hou, UC Berkeley
- Youpeng Li, University of Texas at Dallas
- Yu-Jye Tung, The Pennsylvania State University
- Yuetian Chen, Purdue University
- Yujin Huang, The University of Melbourne
- Yumingzhi Pan, Southeast University
- Yunkai Zou, Nankai University
- Yunpeng Tian, The Hong Kong Polytechnic University
- Yupei Liu, Penn State
- yuwei xiao, Linkedin
- Zachary Espiritu, MongoDB Research
- Zewei Shi, The University of Melbourne; CSIRO’s Data61
- Zeyang Zhuang, The Chinese University of Hong Kong
- Zhengjie Ji, Virginia Tech
- Zhengyao Lin, Carnegie Mellon University
- Zhikang Xie, The University of Hong Kong
- Zhiyu Zhang, Institute of Information Engineering, Chinese Academy of Sciences
- Zhou Zhang, Beihang University
- Zi-Quan You, Tsinghua University
- Zifan Peng, The Hong Kong University of Science and Technology (Guangzhou)
- Zihan Wang, The University of Queensland and CSIRO’s Data61
- Zilong Lin, University of Missouri-Kansas City
- Ziqing Yang, CISPA Helmholtz Center for Information Security
- Zizhuang Deng, Shandong University
- Zsolt Kucsvan, University of Twente
- Zuchao Ma, The Hong Kong Polytechnic University
Artifact Evaluation Committee (Single review cycle)
- Noa Izsak, CISPA Helmholtz Center for Information Security
- Tim Leonhard Storm, Paderborn University