Get my own profile
Public access
View all50 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Haibo ChenFACM & FIEEE, Distinguished Professor, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Dong DuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Wenhao LiShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Jinyu GuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Qingyuan LiuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Cheng TanNortheasternVerified email at northeastern.edu
Feng erhuShanghai Jiao Tong universityVerified email at sjtu.edu.cn
Long LuAssociate Professor of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Shoumeng YanAnt GroupVerified email at antfin.com
Zhichuang SunGoogleVerified email at google.com
Nathan DautenhahnRice UniversityVerified email at rice.edu
Beng Chin OOINational University of SingaporeVerified email at comp.nus.edu.sg
Hao Zhang4Paradigm TechnologyVerified email at 4paradigm.com
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Yunji ChenInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Le GuanSchool of Computing at the University of GeorgiaVerified email at uga.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu