Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yunsi FeiProfessor of Electrical and Computer Engineering, Northeastern UniversityVerified email at ece.neu.edu
Yukui LuoUniversity of Massachusetts DartmouthVerified email at umassd.edu
Yanzhi WangNortheastern UniversityVerified email at northeastern.edu
Xiaolin Xu (徐啸林)Northeastern UniversityVerified email at northeastern.edu
Siyue WangResearch Scientist, MicrosoftVerified email at northeastern.edu
pu zhaoNortheastern UniversityVerified email at husky.neu.edu
Xue LinNortheastern UniversityVerified email at northeastern.edu
Majid SabbaghNortheastern UniversityVerified email at husky.neu.edu
Thomas WahlNortheastern University, Boston, USAVerified email at northeastern.edu
Aidong Adam DingAssociate Professor of Mathematics, Northeastern UniversityVerified email at neu.edu
Ruyi DingNortheastern UniversityVerified email at northeastern.edu
TIANHONG XUPhd student, Northeastern UniversityVerified email at northeastern.edu
Hongjia LiApplied Scientist, AmazonVerified email at amazon.com
Geng YuanUniversity of GeorgiaVerified email at uga.edu
Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
Kalikinkar MandalAssistant Professor at University of New Brunswick, FrederictonVerified email at uwaterloo.ca
Raghvendra RohitLead Cryptographer, Technology Innovation Institute, Abu DhabiVerified email at tii.ae
Nusa ZidaricLeiden UniversityVerified email at liacs.leidenuniv.nl
Anantha ChandrakasanDean of Engineering, Massachusetts Institute of TechnologyVerified email at mit.edu
Kyungmi LeePostdoctoral Associate, Massachusetts Institute of TechnologyVerified email at mit.edu