Get my own profile
Public access
View all26 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Rujia LiInstitute for Advanced Study, Tsinghua UniversityVerified email at tsinghua.edu.cn
Yi LiuJinan UniversityVerified email at jnu.edu.cn
David GalindoCTO, Valory AGVerified email at valory.xyz
Cunsheng DingProfessor of Computer Science, HKUSTVerified email at cse.ust.hk
Alexander PottOtto von Guericke University, Faculty of MathematicsVerified email at ovgu.de
Prof. Shiping ChenCSIRO Data61, AustraliaVerified email at data61.csiro.au
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Jerod MichelNanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
Siu-Ming YiuProfessor of Computer Science, The University of Hong KongVerified email at cs.hku.hk
Zhengchun ZhouSouthwest Jiaotong University (Professor)Verified email at home.swjtu.edu.cn
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Yue ZhouNational University of Defense TechnologyVerified email at nudt.edu.cn
Shengcai LiuSouthern University of Science and TechnologyVerified email at sustech.edu.cn
Ke TangProfessor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Thomas HardjonoMITVerified email at mit.edu
Haode YanSouthwest Jiaotong UniversityVerified email at swjtu.edu.cn
Rui HeSUSTech and University of BirminghamVerified email at student.bham.ac.uk
Yew-Soon OngPresident Chair Professor of Computer Science, A*Star AI Chief Scientist, FIEEEVerified email at ntu.edu.sg
Maosheng XiongAssociate Professor of Mathematics, Hong Kong University of Science and TechnologyVerified email at ust.hk
Sisi DuanResearch Scientist, PhD Advisor, Tsinghua UniversityVerified email at mail.tsinghua.edu.cn