Get my own profile
Public access
View all42 articles
16 articles
available
not available
Based on funding mandates
Co-authors
Yike GuoDept of CSE, The Hong Kong University of Science and TechnologyVerified email at ust.hk
Hao DongAssistant Professor at Peking UniversityVerified email at pku.edu.cn
Fei WuProfessor of Computer Science, Zhejiang UniversityVerified email at cs.zju.edu.cn
Kun KuangZhejiang UniversityVerified email at zju.edu.cn
Jun XIAOInstitute of Artificial Intelligence, Zhejiang UniversityVerified email at zju.edu.cn
Fengda ZhangZhejiang University, Nanyang Technological UniversityVerified email at zju.edu.cn
Akara Supratak, PhDAssistant Professor of Computer Science, Mahidol UniversityVerified email at mahidol.edu
Jie ZhangETH Zurich, Institute of Information SecurityVerified email at inf.ethz.ch
Tao ShenZhejiang UniversityVerified email at zju.edu.cn
Simon HuAssistant Professor at Zhejiang UnviersityVerified email at zju.edu.cn
PRN ChildsImperial College LondonVerified email at imperial.ac.uk
Moustafa GhanemProfessor, Middlesex University London, Visiting Imperial College London, Nile University CairoVerified email at imperial.ac.uk
Li GuoSenior Lecturer in Computing, Manchester Metropolitan UniversityVerified email at mmu.ac.uk
Xin XiaDirector of the Software Engineering Application Technology Lab, Huawei Technologies, ChinaVerified email at acm.org
Zhen WeiPhD, Imperial College LondonVerified email at ic.ac.uk
Dilshan SilvaPost Doc, Imperial College LondonVerified email at imperial.ac.uk
Orestis TsinalisImperial College LondonVerified email at imperial.ac.uk
Liuqing ChenZJU-100 Young Professor at Zhejiang UniversityVerified email at zju.edu.cn
Paul M. MatthewsEdmond and Lily Safra Chair, Professor of Clinical Neurosciences, Imperial College LondonVerified email at imperial.ac.uk
Binbing LiaoZhejiang UniversityVerified email at zju.edu.cn