Get my own profile
Public access
View all37 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Xiaochun CaoSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Di JinTianjin University, ProfessorVerified email at tju.edu.cn
Yuanfang GuoBeihang UniversityVerified email at connect.ust.hk
Dongxiao HeTianjin University, Associate Professor of Computer ScienceVerified email at tju.edu.cn
Hua ZhangPh.D., Associate Professor,State Key Laboratory of Information Security Institute of InformationVerified email at iie.ac.cn
si liuBeihang UniversityVerified email at buaa.edu.cn
Xiaojie Guo (郭晓杰)Tianjin UniversityVerified email at tju.edu.cn
Huazhu FuPrincipal Scientist, IHPC, A*STARVerified email at ieee.org
Jing WangUniversity of GreenwichVerified email at greenwich.ac.uk
Yi Ma (马毅)Professor of EECS, UC Berkeley; Director of IDS & Head of CS, University of Hong KongVerified email at eecs.berkeley.edu
Xinggang WangProfessor, Huazhong University of Science and TechnologyVerified email at hust.edu.cn
Meng GeNational University of SingaporeVerified email at nus.edu.sg
Jianwu DangJAIST, Japan / Tianjin Univ., ChinaVerified email at jaist.ac.jp
Xiao WangAssociate Professor, Beihang UniversityVerified email at buaa.edu.cn
Hongkai XiongDistinguished Professor, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Françoise Fogelman-SouliéHub France IAVerified email at hub-franceIA.fr
Jungong HanChair Professor in Computer Vision, University of Sheffield, UK, FIAPR, FAAIAVerified email at sheffield.ac.uk
Wenqi RenSun Yat-sen UniversityVerified email at mail.sysu.edu.cn