Get my own profile
Public access
View all87 articles
100 articles
available
not available
Based on funding mandates
Co-authors
- Guoming TangThe Hong Kong University of Science and Technology (Guangzhou)Verified email at hkust-gz.edu.cn
- Bangbang RenNational University of Defense TechnologyVerified email at cs.uni-goettingen.de
- Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
- Junjie XieNational university of defense technologyVerified email at ucsc.edu
- Xiaolei ZhouNational University of Defense TechnologyVerified email at nudt.edu.cn
- Yulong ShenXidian UniversityVerified email at mail.xidian.edu.cn
- Xiang ZhaoProfessor, National University of Defense Technology, ChinaVerified email at nudt.edu.cn
- Yunhao LiuACM Fellow, IEEE Fellow, CCF Fellow, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Xiaoqiang TengNational University of Defense TechnologyVerified email at nudt.edu.cn
- Keqiu LiTianjin UniversityVerified email at tju.edu.cn
- Kui WuProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
- Ori RottenstreichTechnionVerified email at cs.technion.ac.il
- Ting QuPhD student, National University of Defense TechnologyVerified email at nudt.edu.cn
- Wenxin Li, ProfessorTianjin UniversityVerified email at tju.edu.cn
- Richard T. B. MaNational University of SingaporeVerified email at comp.nus.edu.sg
- Xu LinPhD student of NUDTVerified email at nudt.edu.cn
- Chen QianProfessor, University of California Santa CruzVerified email at ucsc.edu
- Yuan HeTsinghua UniversityVerified email at greenorbs.com
- yueyue chenNational University of Denfense TechnologyVerified email at nudt.edu.cn
- Yulan GuoProfessor, Sun Yat-sen UniversityVerified email at sysu.edu.cn