Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jun LiRetired Professor, Tsinghua UniversityVerified email at tsinghua.edu.cn
Mengwei XuAssistant Professor, Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Shangguang WangBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Xiaohe HuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Xiao MaBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Zhi LiuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Feng QianAssistant Professor at University of Minnesota - Twin CitiesVerified email at umn.edu
Xuanzhe LiuPeking University | ACM Distinguished ScientistVerified email at pku.edu.cn
Wei XuVMwareVerified email at vmware.com
Yan SunByteDanceVerified email at tiktok.com
Shijie ZhouUniversity of Southern CaliforniaVerified email at usc.edu
Shijie SunSenior Algorithm Enginner, Alibaba GroupVerified email at ucsd.edu
Chengjun(Jake) JiaTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Mohammad Hashem HaghighatPhD Student of Network Security, Tsinghua UniversityVerified email at mails.tsinghua.edu.cn
Jiaqi GaoAlibaba GroupVerified email at alibaba-inc.com