Get my own profile
Public access
View all55 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Pan HuiChair Professor, Nokia Chair in Data Science, FREng & IEEE Fellow (HKUST & University of Helsinki)Verified email at cse.ust.hk
Xiaoming FuProfessor of Computer Science, University of GoettingenVerified email at cs.uni-goettingen.de
Xing LiTsinghua UniversityVerified email at cernet.edu.cn
Qingyuan GongPre-tenure Associate Professor, Fudan UniversityVerified email at fudan.edu.cn
Yu XiaoAssociate Professor, Aalto University, FinlandVerified email at aalto.fi
Tianyi WangByteDanceVerified email at bytedance.com
Tianyin XuUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Long JinFacebook AIVerified email at fb.com
Xinlei HeCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Cong DingCornell UniversityVerified email at cs.cornell.edu
JIYAO HUPhD Student in Computer Science, Duke UniversityVerified email at cs.duke.edu
Zengbin ZhangUniversity of California, Santa BarbaraVerified email at cs.ucsb.edu
Lei ShiProfessor, School of Computer Science and Engineering, Beihang UniversityVerified email at buaa.edu.cn
Ben Y. ZhaoNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
Eng Keong LuaPhD in Computer Science (University of Cambridge, UK)Verified email at computer.org
Qinge XieGeorgia Institute of TechnologyVerified email at gatech.edu
Xiao (Sophia) WangUniversity of WashingtonVerified email at cs.washington.edu
Qiang CaoSchool of Computer Science and Technology, East China Normal UniversityVerified email at cs.ecnu.edu.cn
Yongqiang XiongMicrosoft Research AsiaVerified email at microsoft.com
Jiayun ZhangUC San DiegoVerified email at ucsd.edu
Follow
Yang Chen
Associate Professor, School of Computer Science, Fudan University
Verified email at fudan.edu.cn - Homepage