Get my own profile
Public access
View all9 articles
30 articles
available
not available
Based on funding mandates
Co-authors
Shaozi Li厦门大学智能科学与技术系教授Verified email at xmu.edu.cn
Jinyi LongCollege of Information Science and Technology, Jinan UniversityVerified email at jnu.edu.cn
Hanrui WuVerified email at hku.hk
Yaojin LinMinnan Normal UniversityVerified email at mnnu.edu.cn
Guodong DuYanshan University, ChinaVerified email at ieee.org
Jinghua LiuDepartment of Computer Science and Technology, Huaqiao University, Xiamen.Verified email at hqu.edu.cn
Zhiming LuoXiamen UniversityVerified email at xmu.edu.cn
Min JIANG 江敏Professor, Xiamen UniversityVerified email at xmu.edu.cn
Professor Kay Chen TANChair Professor, Dept. of Data Science & Artificial Intelligence, Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Hong-Bo ZhangSchool of Computer Science and technology, Huaqiao UniversityVerified email at hqu.edu.cn
Xindong Wu (吴信东)Hefei University of TechnologyVerified email at hfut.edu.cn
Qinghua HuProfessor of Computer Science, Tianjin UniversityVerified email at tju.edu.cn
Guoxu ZhouGuangdong University of TechnologyVerified email at ieee.org
Zhi-An HuangCity University of Hong Kong (Dongguan)Verified email at cityu-dg.edu.cn
Edmond Q. WuDepartment of Computer Science and Engineering, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Yong TangSouth China Normal University