Get my own profile
Co-authors
Fengjun LiUniversity of KansasVerified email at ku.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Dongwon LeeAssociate Professor, The Pennsylvania State UniversityVerified email at psu.edu
Le GuanDepartment of Computer Science at the University of GeorgiaVerified email at cs.uga.edu
Yuhao YangMicrosoft | University of KansasVerified email at microsoft.com
Abdulmalik HumayedJazan UniversityVerified email at jazanu.edu.sa
Wang-Chien LeePennsylvania State UniversityVerified email at cse.psu.edu
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Xuewen ChenAIWAYSVerified email at ai-ways.com
Jun (Luke) HuanBaidu ResearchVerified email at baidu.com
Shu HuangMicrosoftVerified email at microsoft.com
Xiaoou TangThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Chao LanUniversity of OklahomaVerified email at ou.edu
Xiaoli LiUniversity of KansasVerified email at ku.edu
Wenrong ZengZoom Video ConferencingVerified email at linkedin.com
Prasenjit MitraProfessor of Information Sciences and Technology, The Pennsylvania State UniversityVerified email at psu.edu
Xiaogang WangAssociate Professor of Electronic Engineering, the Chinese University of Hong KongVerified email at ee.cuhk.edu.hk
Hongliang FeiBaidu Research USAVerified email at baidu.com
Gunes ErcalSouthern Illinois University EdwardsvilleVerified email at siue.edu
Nenghai YuUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn