Get my own profile
Public access
View all86 articles
86 articles
available
not available
Based on funding mandates
Co-authors
- Bangbang RenNational University of Defense TechnologyVerified email at cs.uni-goettingen.de
- Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
- Junjie XieNational university of defense technologyVerified email at ucsc.edu
- Xiaolei ZhouNational University of Defense TechnologyVerified email at nudt.edu.cn
- Yunhao LiuACM Fellow, IEEE Fellow, CCF Fellow, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Yulong ShenXidan UniversityVerified email at mail.xidian.edu.cn
- Xiaoqiang TengNational University of Defense TechnologyVerified email at nudt.edu.cn
- Xiang ZhaoProfessor, National University of Defense Technology, ChinaVerified email at nudt.edu.cn
- Keqiu LiTianjin UniversityVerified email at tju.edu.cn
- Ting QuPhD student, National University of Defense TechnologyVerified email at nudt.edu.cn
- Ori RottenstreichTechnionVerified email at cs.technion.ac.il
- Kui WuProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
- Wenxin Li, Associate ProfessorTianjin UniversityVerified email at tju.edu.cn
- Xu LinPhD student of NUDTVerified email at nudt.edu.cn
- Richard T. B. MaNational University of SingaporeVerified email at comp.nus.edu.sg
- Chen QianProfessor, University of California Santa CruzVerified email at ucsc.edu
- yueyue chenNational University of Denfense TechnologyVerified email at nudt.edu.cn
- Yuan HeTsinghua UniversityVerified email at greenorbs.com
- Panlong YangProfessor at Nanjing University of Information Science and TechnologyVerified email at ustc.edu.cn
- Guihai ChenProfessor of Computer ScienceVerified email at nju.edu.cn