Get my own profile
Public access
View all25 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Rujia LiInstitute for Advanced Study, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Prof. Shiping ChenCSIRO Data61, AustraliaVerified email at data61.csiro.au
- Yi LiuJinan UniversityVerified email at jnu.edu.cn
- David GalindoCTO, Valory AGVerified email at valory.xyz
- Cunsheng DingProfessor of Computer Science, HKUSTVerified email at cse.ust.hk
- Alexander PottOtto von Guericke University, Faculty of MathematicsVerified email at ovgu.de
- Jerod MichelNanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
- Siu-Ming YiuProfessor of Computer Science, The University of Hong KongVerified email at cs.hku.hk
- Yue ZhouNational University of Defense TechnologyVerified email at nudt.edu.cn
- Zhengchun ZhouSouthwest Jiaotong University (Professor)Verified email at home.swjtu.edu.cn
- Thomas HardjonoMITVerified email at mit.edu
- Shengcai LiuSouthern University of Science and TechnologyVerified email at sustech.edu.cn
- Ke TangProfessor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
- Haode YanSouthwest Jiaotong UniversityVerified email at swjtu.edu.cn
- Maosheng XiongAssociate Professor of Mathematics, Hong Kong University of Science and TechnologyVerified email at ust.hk
- Rui HeSUSTech and University of BirminghamVerified email at student.bham.ac.uk
- Yew-Soon OngPresident Chair Professor of Computer Science, A*Star AI Chief Scientist, FIEEEVerified email at ntu.edu.sg
- Jinming WenCollege of Information Science and Technology, Jinan UniversityVerified email at jnu.edu.cn