Get my own profile
Public access
View all62 articles
57 articles
available
not available
Based on funding mandates
Co-authors
Yu Wang (王昱)Professor of Computer and Information Sciences, FIEEE, DMACM, Temple UniversityVerified email at temple.edu
Kashif SharifBeijing Institute of Technology, ChinaVerified email at bit.edu.cn
Boubakr NourSecurity Researcher, Ericsson, Montreal, CanadaVerified email at ericsson.com
Huijie Chen (陈慧杰)Department of Computer Science, Beijing University of TechnologyVerified email at bjut.edu.cn
liehuang zhuBeijing Institute of TechnologyVerified email at bit.edu.cn
Yang LiuProfessor of Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Meng ShenBeijing Institute of TechnologyVerified email at bit.edu.cn
Xin LiBeijing Institute of TechnologyVerified email at bit.edu.cn
TING LIAssistant Professor in Computer Science, Oxford College of Emory UniversityVerified email at emory.edu
Siyuan ChenVerified email at uncc.edu
Ke XUComputer Science Department, Tsinghua UniversityVerified email at tsinghua.edu.cn
Mingzhong WangUniversity of the Sunshine CoastVerified email at usc.edu.au
Shaojie TangUniversity of Texas at DallasVerified email at utdallas.edu
Bin XuProfessof of Computer Science and Technology, Tsinghua UniversityVerified email at tsinghua.edu.cn
Xinghua (Mindy) ShiTemple UniversityVerified email at temple.edu
Lijuan CaoUniversity of North Carolina CharlotteVerified email at uncc.edu
Cheng BoGoogleVerified email at google.com
Xufei MaoTsinghua UniversityVerified email at mail.tsinghua.edu.cn
Yu ChengElectrical and Computer Engineering, Illinois Institute of TechnologyVerified email at iit.edu
JIMING CHENProfessor at Zhejiang UniversityVerified email at ieee.org
Follow
Fan Li (李凡)
Professor of School of Computer Science, Beijing Institute of Technology
Verified email at bit.edu.cn - Homepage