Get my own profile
Public access
View all10 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
- Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
- Xiaojing LiaoIndiana University BloomingtonVerified email at indiana.edu
- Wei YouRenmin University of ChinaVerified email at ruc.edu.cn
- Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityVerified email at purdue.edu
- Jianjun HuangSchool of Information, Renmin University of ChinaVerified email at ruc.edu.cn
- Nan ZhangFacebook Inc.Verified email at indiana.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Raheem BeyahDean and Southern Company Chair, Georgia Tech College of EngineeringVerified email at ece.gatech.edu
- Feng QianAssociate Professor at University of Southern CaliforniaVerified email at usc.edu
- Xianghang MiUSTCVerified email at ustc.edu.cn
- Yi ChenIndiana University BloomingtonVerified email at iu.edu
- Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
- Sumayah AlrwaisAssistant Professor at King Saud University, Saudi ArabiaVerified email at ksu.edu.sa
- Kan YuanIndiana University Computer Science DepartmentVerified email at indiana.edu
- Tongxin LiPeking UniversityVerified email at pku.edu.cn
- Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Heqing HuangAffiliate Professor UCAS;Watson and AI Lab