Get my own profile
Public access
View all46 articles
42 articles
available
not available
Based on funding mandates
Co-authors
- Ning GuProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Hansu GUAmazon.comVerified email at colorado.edu
- Xianghua (Sharon) DingUniversity of GlasgowVerified email at glasgow.ac.uk
- Li ShangFudan University, Univ. Colorado BoulderVerified email at fudan.edu.cn
- Dongsheng LiMicrosoft Research AsiaVerified email at microsoft.com
- Qin LvUniversity of Colorado BoulderVerified email at colorado.edu
- Bin ShaoMicrosoft Research (Beijing, China)Verified email at microsoft.com
- Chao ChenShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Liping GaoAssociate ProfessorVerified email at usst.edu.cn
- Haiyi ZhuAssociate Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Yujiang WangUniversity of OxfordVerified email at oscar.ox.ac.uk
- Stephen ChuResearch Staff Member, IBM T. J. Watson Research CenterVerified email at us.ibm.com
- Qi WangComputer Science, Fudan UniversityVerified email at fudan.edu.cn
- Yuling SunEast China Normal UniversityVerified email at cs.ecnu.edu.cn
- Silvia LindtnerUniversity of Michigan, School of InformationVerified email at umich.edu
- Changyang HeMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
- Jiang Yang 杨疆Researcher, AlibabaVerified email at umich.edu
- Xiaomu ZhouNortheastern UniversityVerified email at northeastern.edu
- Charlotte P. LeeProfessor of Human Centered Design & Engineering, University of WashingtonVerified email at uw.edu
- Hongfei FanTongji UniversityVerified email at tongji.edu.cn
Follow
Tun LU (卢暾)
Professor, School of Computer Science, Fudan University
Verified email at fudan.edu.cn - Homepage