Get my own profile
Public access
View all32 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Li ShangUniversity of Colorado BoulderVerified email at colorado.edu
Ning GuProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Qin LvUniversity of Colorado BoulderVerified email at colorado.edu
Tun LUProfessor, School of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Stephen ChuResearch Staff Member, IBM T. J. Watson Research CenterVerified email at us.ibm.com
Chao ChenShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Junchi YanProf. of Shanghai Jiao Tong University (2018-), RSM of IBM Research (2011-2018)Verified email at cs.sjtu.edu.cn
Hansu GUAmazon.comVerified email at colorado.edu
Caihua ShanMicrosoft Research AsiaVerified email at microsoft.com
Zhang PengFudan UniversityVerified email at fudan.edu.cn
Xinyang JiangMicrosoft Research AsiaVerified email at microsoft.com
Huanhuan XiaFudan UniversityVerified email at fudan.edu.cn
Bo YangSchool of Computer Science and Engineering, University of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Yezhen Wangmicrosoft research AsiaVerified email at microsoft.com
Kan RenMicrosoft ResearchVerified email at microsoft.com
Yao ZhangFudan UniversityVerified email at fudan.edu.cn
Li BoPhD Student, NTU, SingaporeVerified email at e.ntu.edu.sg
Xiang LiEast China Normal UniversityVerified email at dase.ecnu.edu.cn
Han ZhaoAssistant Professor of Computer Science, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Kurt KeutzerProfessor of the Graduate School, EECS, University of California, BerkeleyVerified email at berkeley.edu