Get my own profile
Public access
View all90 articles
90 articles
available
not available
Based on funding mandates
Co-authors
Guoming TangThe Hong Kong University of Science and Technology (Guangzhou)Verified email at hkust-gz.edu.cn
Bangbang RenNational University of Defense TechnologyVerified email at cs.uni-goettingen.de
Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
Junjie XieNational university of defense technologyVerified email at ucsc.edu
Xiaolei ZhouNational University of Defense TechnologyVerified email at nudt.edu.cn
Yunhao LiuACM Fellow, IEEE Fellow, CCF Fellow, Tsinghua UniversityVerified email at tsinghua.edu.cn
Xiang ZhaoProfessor, National University of Defense Technology, ChinaVerified email at nudt.edu.cn
Yulong ShenXidan UniversityVerified email at mail.xidian.edu.cn
Xiaoqiang TengNational University of Defense TechnologyVerified email at nudt.edu.cn
Keqiu LiTianjin UniversityVerified email at tju.edu.cn
Ori RottenstreichTechnionVerified email at cs.technion.ac.il
Kui WuProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
Ting QuPhD student, National University of Defense TechnologyVerified email at nudt.edu.cn
Wenxin Li, ProfessorTianjin UniversityVerified email at tju.edu.cn
Xu LinPhD student of NUDTVerified email at nudt.edu.cn
Richard T. B. MaNational University of SingaporeVerified email at comp.nus.edu.sg
Chen QianProfessor, University of California Santa CruzVerified email at ucsc.edu
yueyue chenNational University of Denfense TechnologyVerified email at nudt.edu.cn
Yuan HeTsinghua UniversityVerified email at greenorbs.com
Panlong YangProfessor at Nanjing University of Information Science and TechnologyVerified email at ustc.edu.cn