Organizers

Artifact Evaluation co-Chairs

Contact the AEC chairs at sec26aec@usenix.org.

Artifact Evaluation Publication Chair

Artifact Evaluation Committee (Full-term)

  • Abdullah Al Ishtiaq, The Pennsylvania State University
  • Ahmed Lekssays, Qatar Computing Research Institute
  • Alessandro Baccarini, Input Output
  • Ameer Kashani Ameer Kashani, DENSO
  • Amit Samanta, University of Utah
  • Amit Singha, Purdue University
  • Anish Chand, Louisiana State University
  • Annika Wilde, Ruhr University Bochum
  • Antonio Muñoz, University of Malaga
  • Arman Riasi, Virginia Tech
  • Arshia Arya, University of California, San Diego
  • Arturo Villacañas, Independent researcher
  • Ashish Kumar, Penn State University
  • Atefeh Mohseni-Ejiyeh, UC Santa Barbara, Harness
  • Bernd Gruner, German Aerospace Center (DLR)
  • Binhao Ma, University of Missouri–Kansas City
  • Bo Zhang, Northwestern Polytechnical University
  • Bocheng Chen, the University of Mississippi
  • Bonan Ruan, National University of Singapore
  • Boru Chen, University of California, Berkeley
  • Bosi Zhang, Huazhong University of Science and Technology
  • Chamikara M.A.P., CSIRO’s Data61
  • Changming Liu, Google
  • Chenkai Wang, University of Illinois Urbana-Champaign
  • Chenyi Wang, University of Arizona
  • Corban Villa, UC Berkeley
  • Dañiel Gerhardt, CISPA Helmholtz Center for Information Security
  • Daniel Pöllmann, ETH Zurich & Lucerne University of Applied Sciences and Arts
  • David Pape, CISPA Helmholtz Center for Information Security
  • Devansh Srivastav, CISPA Helmholtz Center for Information Security
  • Dominic Troppmann, CISPA Helmholtz Center for Information Security
  • Dongwook Kim, Yonsei University
  • Ehsanul Kabir, Penn State University
  • Elizabeth Lin, North Carolina State University
  • Eric Ackermann, CISPA
  • Eric García Arribas, TU Graz
  • Fabian Bäumer, Ruhr University Bochum
  • Fabian Fleischer, Georgia Institute of Technology
  • Fabian Thomas, CISPA Helmholtz Center for Information Security
  • Fariba Osali, Max Planck Institute for Informatics
  • Federico Mazzone, University of Twente
  • Felix Lange, Paderborn University
  • Feng Luo, The Hong Kong Polytechnic University
  • Florian Roudot, Univ Rennes
  • Fujiao Ji, University of Tennessee, Knoxville
  • Giuseppe Parrella, University of Salerno
  • Guilhem Lacombe, VERIMAG, Université Grenoble-Alpes
  • Guillaume DIDIER, Universität des Saarlandes
  • Guofeng Tang, Singapore Management University
  • Guruprasad Viswanathan Ramesh, University of Wisconsin-Madison
  • Gwihwan Go, Tsinghua University
  • Hamza Mouhcine, Qatar Computing Research Institute
  • Haodi Zou, University of California San Diego
  • Hassan El Alami, Howard University
  • Hocheol Nam, KAIST
  • Hongsheng Hu, University of Newcastle
  • Hongyan CHANG, MBZUAI
  • Huiyun Peng, Purdue University
  • Iman Alipour, Max Planck Institute for Informatics
  • Ismat Jarin, University of California, Irvine
  • Jan Drescher, TU Braunschweig
  • Jean-Charles Noirot Ferrand, University of Wisconsin-Madison
  • Jiahao Cao, Tsinghua University
  • Jiahao Yu, Northwestern University
  • Jian Cui, University of Illinois Urbana-Champaign
  • Jiangrui Yu, Peking University
  • Jiate Li, University of Southern California
  • Jie Fu, Stevens Institute of Technology
  • Jie Ma, Beihang University
  • Jinan Jiang, The Hong Kong Polytechnic University
  • Jinhao Zhu, UC Berkeley
  • Jinseo Lee, KAIST
  • Jiongchi Yu, Singapore Management University
  • Jiping Yu, Tsinghua University
  • Jiwon Kim, Purdue University
  • Jonas Mücke, TU Dresden
  • Joseph Khoury, Louisiana State University
  • Juefei Pu, University of California, Riverside
  • Juhee Kim, Seoul National University
  • Julian Funk, Friedrich-Alexander-Universität Erlangen-Nürnberg
  • Junkai Liang, Peking University
  • Junming Chen, George Mason University
  • Junming Liu, MPI-SP
  • Junqi Zhang, University of Science and Technology of China
  • Junrui Liu, University of California, Santa Barbara
  • Juyang Bai, Johns Hopkins University
  • Kai Ma, Huazhong University of Science and Technology
  • Kaixuan Luo, The Chinese University of Hong Kong
  • Katharina Ceesay-Seitz, ETH Zurich
  • Kelechi Kalu, Purdue University
  • Keno Hassler, CISPA Helmholtz Center for Information Security
  • Kevin Nam, Seoul National University
  • Kunlin Li, The Hong Kong University of Science and Technology (Guangzhou)
  • Kunsong Zhao, The Hong Kong Polytechnic University
  • Kunyang Li, University of Wisconsin-Madison
  • Kyungchan Lim, University of Maryland
  • Leming Shen, The Hong Kong Polytechnic University
  • Leonhard Balduf, TU Darmstadt
  • Lihua Wang, The University of New South Wales
  • Lipeng He, University of Waterloo
  • Long Huang, University of Michigan
  • Longxiang Wang, City University of Hong Kong
  • Luca Wilke, Microsoft Research
  • Mahmoud Khalifa, Prince Sultan University
  • Malvika Jadhav, University of Florida
  • Marcel Maehren, Ruhr University Bochum
  • Marius Fleischer, NVIDIA
  • Mathé Hertogh, VU Amsterdam
  • Maynard Koch, TU Dresden
  • Md Sadik Awal, Florida International University
  • Mehtab Zafar, National University of Singapore
  • Meng Chen, Zhejiang University
  • Mengling LIU, The Hong Kong Polytechnic University
  • Michele Guerra, New York University Abu Dhabi
  • Michele Ianni, University of Calabria, Italy
  • Mingming Zha, Indiana University Bloomington
  • Mingyi Liu, Georgia Institute of Technology
  • Minjun (Elena) Long, University of Virginia
  • Mohamadreza Rostami, Technical University of Darmstadt
  • Mugdha Khedkar, Heinz Nixdorf Institute, Paderborn University (Germany)
  • Mughees Ur Rehman, Virginia Tech
  • Muxi Lyu, UC Berkeley
  • Nicola Bottura, Prisma s.r.l.
  • Niklas Niere, Paderborn University
  • Nima Naderloui, University of Connecticut
  • Noah Mauthe, CISPA Helmholtz Center for Information Security
  • Nurlan Nazaraliyev, University of California Riverside
  • Paschalis Bekos, Stony Brook University
  • Patrick Jattke, ETH Zurich
  • Paul Chung, UC San Diego
  • Paul OLIVIER, LAAS-CNRS
  • Peiran Xu, UCLA
  • Peiyang Li, Ant Group & Tsinghua University
  • Philipp Beer, TU Wien
  • Pratik M. Kamble, Binghamton University
  • Puzhuo Liu, Ant Group & Tsinghua University
  • Qing Deng, University of California, Riverside
  • Qisheng Jiang, Duke University
  • Rahul Kande, Advanced Micro Devices (AMD)
  • Rajdeep Ghosh, Indian Institute of Technology, Kharagpur
  • Ravan Nazaraliyev, University of California, Riverside
  • Robin Kirchner, TU Braunschweig
  • Ryan Vrecenar, Sandia National Laboratories
  • Sachin Shukla, Microsoft
  • Sachin Kumar Singh, University of Utah
  • Sambhav Satija, University of Wisconsin-Madison
  • Seoyoung Kweon, UC San Diego
  • Sepehr Mirzaei, Saarland University
  • Seungju Lee, Princeton University
  • Shao-Yu Chu, UCSD
  • Shayan Shabihi, University of Maryland, College Park
  • Shenglong Yao, Georgia Institute of Technology
  • Shengtuo Hu, Palo Alto Networks
  • Shenyi Zhang, Wuhan University
  • Shoupeng Ren, Zhejiang University
  • Shubham Agarwal, Max Planck Institute for Security and Privacy
  • Side Liu, Tulane University
  • Siliang Qin, Institute of Information Engineering, Chinese Academy of Sciences
  • Simin Chen, Columbia university
  • Sofiane Azogagh, Université du Québec à Montréal
  • Stanley Wu, University of Chicago
  • Sungwoo Kim, Purdue University
  • Taeung Yoon, University of Illinois Urbana Champaign
  • Thom Wiggers, PQShield
  • Tian Dong, The University of Hong Kong
  • Tianshi Xu, Peking University
  • Tingwei Zhang, Cornell Tech
  • Tong Sun, Zhejiang University
  • Tushar Nayan, Florida International University
  • Vaishnavi Raghavajosyula, Max Planck Institute for Informatics
  • Valentino Dalla Valle, CISPA Helmholtz Center for Information Security
  • Verena Lachner, University of Innsbruck
  • Vishnu Dasu, Pennsylvania State University
  • Wanning Ding, Syracuse University
  • Weiheng Bai, University of Minnesota
  • Weikang Ding, University of Missouri-Kansas City
  • Xia Zhou, Zhejiang University
  • Xiang Li, George Mason University
  • Xiang Zhang, Tianjin University
  • Xiao Zhan, Universitat Politècnica de València & University of Cambridge
  • Xiaohan Zhang, Fudan University
  • Xiaoyue Ma, George Mason University
  • Xijia Che, University of Illinois, Urbana-Champaign
  • Xin Zhang, Peking University
  • Xingyu Lyu, University of Massachusetts Lowell
  • Xuanming Liu, Zhejiang University
  • Yao Zhao, Victoria University
  • Yaofei Wang, Hefei University of Technology
  • Yassine Mekdad, Florida International University
  • Ye Shu, UC San Diego
  • Yi Zhou, Amazon Web Serivce
  • Yibo Jin, The Hong Kong University of Science and Technology
  • Yichen Liu, University of Illinois Urbana-Champaign
  • Ying Li, University of California, Los Angeles
  • Yiwei Hou, UC Berkeley
  • Youpeng Li, University of Texas at Dallas
  • Yu-Jye Tung, The Pennsylvania State University
  • Yuetian Chen, Purdue University
  • Yujin Huang, The University of Melbourne
  • Yumingzhi Pan, Southeast University
  • Yunkai Zou, Nankai University
  • Yunpeng Tian, The Hong Kong Polytechnic University
  • Yupei Liu, Penn State
  • yuwei xiao, Linkedin
  • Zachary Espiritu, MongoDB Research
  • Zewei Shi, The University of Melbourne; CSIRO’s Data61
  • Zeyang Zhuang, The Chinese University of Hong Kong
  • Zhengjie Ji, Virginia Tech
  • Zhengyao Lin, Carnegie Mellon University
  • Zhikang Xie, The University of Hong Kong
  • Zhiyu Zhang, Institute of Information Engineering, Chinese Academy of Sciences
  • Zhou Zhang, Beihang University
  • Zi-Quan You, Tsinghua University
  • Zifan Peng, The Hong Kong University of Science and Technology (Guangzhou)
  • Zihan Wang, The University of Queensland and CSIRO’s Data61
  • Zilong Lin, University of Missouri-Kansas City
  • Ziqing Yang, CISPA Helmholtz Center for Information Security
  • Zizhuang Deng, Shandong University
  • Zsolt Kucsvan, University of Twente
  • Zuchao Ma, The Hong Kong Polytechnic University

Artifact Evaluation Committee (Single review cycle)

  • Noa Izsak, CISPA Helmholtz Center for Information Security
  • Tim Leonhard Storm, Paderborn University