Get my own profile
Public access
View all7 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Yaxuan QiYunshan Networks Inc.Verified email at yunshan.net.cn
- Zhi LiuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
- Zhe FuAlibaba DAMO AcademyVerified email at alibaba-inc.com
- Zhen ChenTsinghua UniversityVerified email at tsinghua.edu.cn
- Edwin HouProfessor, Department of Electrical and Computer Engineering, New Jersey Institute of TechnologyVerified email at njit.edu
- Weirong JiangByteDanceVerified email at bytedance.com
- Xiaohe HuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
- Lianghong XuCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Xinming ChenUniversity of Massachusetts AmherstVerified email at google.com
- Viktor K. PrasannaUniversity of Southern CaliforniaVerified email at usc.edu
- Ravindra NuggehalliProfessor, Department of Physics, New Jersey Institute of TechnologyVerified email at njit.edu
- Jiaxing Shang (尚家兴)Professor, College of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
- Feng XiePhD Candidate in Tsinghua UniversityVerified email at mails.tsinghua.edu.cn
- Scott ShenkerProfessor of Computer Science, UC BerkeleyVerified email at icsi.berkeley.edu
- Zongwei ZhouSoftware Engineer at Google (Ph.D. from Carnegie Mellon University)Verified email at andrew.cmu.edu
- Kai ZhengDirector, Computer Network & Protocol Research Lab, Huawei TechnologiesVerified email at tsinghua.org.cn
- Mohammad Hashem HaghighatPhD Student of Network Security, Tsinghua UniversityVerified email at mails.tsinghua.edu.cn
- Jiaqi GaoAlibaba GroupVerified email at alibaba-inc.com
- Junda LiuUC Berkeley, ICSI, Google Inc.Verified email at google.com
- Yiyang ShaoHuaweiVerified email at huawei.com