Get my own profile
Public access
View all87 articles
104 articles
available
not available
Based on funding mandates
Co-authors
Guoming TangThe Hong Kong University of Science and Technology (Guangzhou)Verified email at hkust-gz.edu.cn
Bangbang RenNational University of Defense TechnologyVerified email at cs.uni-goettingen.de
Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
Junjie XieNational university of defense technologyVerified email at ucsc.edu
Xiaolei ZhouNational University of Defense TechnologyVerified email at nudt.edu.cn
Yulong ShenXidian UniversityVerified email at mail.xidian.edu.cn
Xiang ZhaoProfessor, National University of Defense Technology, ChinaVerified email at nudt.edu.cn
Yunhao LiuACM Fellow, IEEE Fellow, CCF Fellow, Tsinghua UniversityVerified email at tsinghua.edu.cn
Xiaoqiang TengNational University of Defense TechnologyVerified email at nudt.edu.cn
Keqiu LiTianjin UniversityVerified email at tju.edu.cn
Kui WuProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
Ori RottenstreichTechnionVerified email at cs.technion.ac.il
Ting QuPhD student, National University of Defense TechnologyVerified email at nudt.edu.cn
Wenxin Li, ProfessorTianjin UniversityVerified email at tju.edu.cn
Richard T. B. MaNational University of SingaporeVerified email at comp.nus.edu.sg
Xu LinPhD student of NUDTVerified email at nudt.edu.cn
Chen QianProfessor, University of California Santa CruzVerified email at ucsc.edu
Yuan HeTsinghua UniversityVerified email at greenorbs.com
yueyue chenNational University of Denfense TechnologyVerified email at nudt.edu.cn
Yulan GuoProfessor, Sun Yat-sen UniversityVerified email at sysu.edu.cn