Get my own profile
Public access
View all26 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Le YuHong Kong Polytechnic University, the Department of Computing, RAPVerified email at polyu.edu.hk
Tao ZhangSchool of Computer Science and Engineering, Macau University of Science and TechnologyVerified email at must.edu.mo
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Yajin ZhouZhejiang UniversityVerified email at zju.edu.cn
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Yuru ShaoPinterestVerified email at pinterest.com
Zhou XUChongqing University & The Hong Kong Polytechnic UniversityVerified email at cqu.edu.cn
CHENXIONG QIANThe University of Hong KongVerified email at cs.hku.hk
Ang ChenRice UniversityVerified email at rice.edu
Alvin T.S. ChanAssociate Professor, Singapore Institute of TechnologyVerified email at SingaporeTech.edu.sg
Qiao KangRice UniversityVerified email at rice.edu
Guozi Sun (孙国梓)Professor, Nanjing University of Posts and TelecommunicationsVerified email at njupt.edu.cn
TANG QIYIInformation Security Researcher, TencentVerified email at tencent.com
Bo AnNanyang Technological UniversityVerified email at ntu.edu.sg
Muhui JiangPh.D. Candidate, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
cong shiSchool of Computer Science, Georgia Institute of TechnologyVerified email at gatech.edu
Ming Fan (范铭)Xi'an Jiaotong UniversityVerified email at mail.xjtu.edu.cn