Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jun LiRetired Professor, Tsinghua UniversityVerified email at tsinghua.edu.cn
Xiaohe HuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Mengwei XuAssistant Professor, Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Shangguang WangBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Zhi LiuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Wei XuVMwareVerified email at vmware.com
Feng QianAssistant Professor at University of Minnesota - Twin CitiesVerified email at umn.edu
Xiao MaBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Xuanzhe LiuPeking University | ACM Distinguished ScientistVerified email at pku.edu.cn
Yan SunByteDanceVerified email at tiktok.com
Shijie ZhouUniversity of Southern CaliforniaVerified email at usc.edu
Shijie SunSenior Algorithm Enginner, Alibaba GroupVerified email at ucsd.edu
Chengjun(Jake) JiaTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Mohammad Hashem HaghighatPhD Student of Network Security, Tsinghua UniversityVerified email at mails.tsinghua.edu.cn
Jiaqi GaoAlibaba GroupVerified email at alibaba-inc.com