Get my own profile
Co-authors
Shiguang ShanProfessor of Institute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Anil K. JainMichigan State UniversityVerified email at cse.msu.edu
Xilin ChenInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Charles OttoMichigan State UniversityVerified email at msu.edu
Wen GaoProfessor of Computer Science, Peking UniversityVerified email at pku.edu.cn
Brendan KlareRank One ComputingVerified email at rankone.io
Xuesong NiuInstitute of Computing TechnologyVerified email at vipl.ict.ac.cn
Di WenCase Western Reserve UniversityVerified email at case.edu
Scott KlumChief Engineer, Rank One ComputingVerified email at rankone.io
Xiaoming LiuMichigan State UniversityVerified email at cse.msu.edu
Lacey Best-RowdenPhD Student, Michigan State UniversityVerified email at msu.edu
Xin LiuCEO of SeetaTech Technology Co., LtdVerified email at seetatech.com
Shaoxin LiYoutu Lab, TencentVerified email at tencent.com
Shuzhe WuInstitute of Computing Technology, Chinese Academy of SciencesVerified email at vipl.ict.ac.cn
Deepak ChandraGoogle incVerified email at google.com
Laiyun QingVerified email at ucas.ac.cn
Koichiro NiinumaVerified email at us.fujitsu.com
Antitza DantchevaResearcher, INRIA, FranceVerified email at inria.fr
Abhijit DasUniversity of Southern California’s Viterbi School of Engineering Information Sciences InstituteVerified email at griffithuni.edu.au
Jean-luc DugelayProfessor, Imaging Security, EURECOMVerified email at eurecom.fr
Hu Han
Associate Professor, Institute of Computing Technology, Chinese Academy of Sciences
Verified email at ict.ac.cn - Homepage