Get my own profile
Public access
View all52 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Haibo ChenFACM & FIEEE, Distinguished Professor, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Dong DuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Wenhao LiShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Jinyu GuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Qingyuan LiuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Cheng TanNortheasternVerified email at northeastern.edu
- Feng erhuShanghai Jiao Tong universityVerified email at sjtu.edu.cn
- Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
- Shoumeng YanAnt GroupVerified email at antfin.com
- Nathan DautenhahnSerenitixVerified email at rice.edu
- Beng Chin OOINational University of SingaporeVerified email at comp.nus.edu.sg
- Hao Zhang4Paradigm TechnologyVerified email at 4paradigm.com
- Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
- Yunji ChenInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
- Le GuanUniversity of GeorgiaVerified email at uga.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu