Get my own profile
Public access
View all24 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Rujia LiInstitute for Advanced Study, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Prof. Shiping ChenCSIRO Data61, AustraliaVerified email at data61.csiro.au
- Yi LiuJinan UniversityVerified email at jnu.edu.cn
- David GalindoCTO, Valory AGVerified email at valory.xyz
- Cunsheng DingProfessor of Computer Science, HKUSTVerified email at cse.ust.hk
- Alexander PottOtto von Guericke University, Faculty of MathematicsVerified email at ovgu.de
- Jerod MichelNanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
- Yue ZhouNational University of Defense TechnologyVerified email at nudt.edu.cn
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
- Siu-Ming YiuProfessor of Computer Science, The University of Hong KongVerified email at cs.hku.hk
- Zhengchun ZhouSouthwest Jiaotong University (Professor)Verified email at home.swjtu.edu.cn
- Thomas HardjonoMITVerified email at mit.edu
- Haode YanSouthwest Jiaotong UniversityVerified email at swjtu.edu.cn
- Shengcai LiuAgency for Science, Technology and ResearchVerified email at cfar.a-star.edu.sg
- Ning LuPhD HKUST & SUSTechVerified email at cse.ust.hk
- Maosheng XiongAssociate Professor of Mathematics, Hong Kong University of Science and TechnologyVerified email at ust.hk
- Pingzhi Fan (范平志)Southwest Jiaotong University (西南交通大学)Verified email at swjtu.edu.cn
- Zhi GuSouthwest Jiaotong UniversityVerified email at my.swjtu.edu.cn
- Liusheng HuangProfessor of Computer Science, University of Science and Technology of ChinaVerified email at ustc.edu.cn