Get my own profile
Public access
View all18 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Bei YuThe Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
- Qi XuUniversity of Science and Technology of China(USTC)Verified email at mail.ustc.edu.cn
- Tinghuan ChenThe Chinese University of Hong Kong, ShenzhenVerified email at cuhk.edu.cn
- Qi SunZJU100 Young Professor, Zhejiang UniversityVerified email at zju.edu.cn
- Haoyu YangNVIDIA Corp.Verified email at nvidia.com
- Song ChenUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
- Yuzhe MaHong Kong University of Science and Technology (Guangzhou)Verified email at hkust-gz.edu.cn
- Lizhe Wang, Academia of Europaea,...China University of GeosciencesVerified email at cug.edu.cn
- Peng LiuThe Aerospace Information Research Institute (AIR), CAS, email: liupeng@radi.ac.cnVerified email at radi.ac.cn
- Chen BaiThe Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
- Xiaoqing WenKyushu Institute of TechnologyVerified email at cse.kyutech.ac.jp
- Ran ChenHuawei Noah's Ark Lab HKRCVerified email at huawei.com
- Jin MiaoGoogleVerified email at google.com
- Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
- Bingqing LinShenzhen UniversityVerified email at szu.edu.cn
- Cheng ZhuoZhejiang UniversityVerified email at zju.edu.cn
- Subhendu RoyCadence Design SystemsVerified email at utexas.edu
- Xingquan LiPhD, Pengcheng Laboratory (PCL), Minnan Normal University;Verified email at pcl.ac.cn
- Shiyan HuProfessor and Chair in Cyber-Physical System Security, University of SouthamptonVerified email at ieee.org