Get my own profile
Public access
View all25 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Rujia LiInstitute for Advanced Study, Tsinghua UniversityVerified email at tsinghua.edu.cn
Prof. Shiping ChenCSIRO Data61, AustraliaVerified email at data61.csiro.au
Yi LiuJinan UniversityVerified email at jnu.edu.cn
David GalindoCTO, Valory AGVerified email at valory.xyz
Cunsheng DingProfessor of Computer Science, HKUSTVerified email at cse.ust.hk
Alexander PottOtto von Guericke University, Faculty of MathematicsVerified email at ovgu.de
Jerod MichelNanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Yue ZhouNational University of Defense TechnologyVerified email at nudt.edu.cn
Siu-Ming YiuProfessor of Computer Science, The University of Hong KongVerified email at cs.hku.hk
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Zhengchun ZhouSouthwest Jiaotong University (Professor)Verified email at home.swjtu.edu.cn
Thomas HardjonoMITVerified email at mit.edu
Haode YanSouthwest Jiaotong UniversityVerified email at swjtu.edu.cn
Ke TangProfessor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Maosheng XiongAssociate Professor of Mathematics, Hong Kong University of Science and TechnologyVerified email at ust.hk
Jinming WenCollege of Information Science and Technology, Jinan UniversityVerified email at jnu.edu.cn
Tor HellesethUniversity of BergenVerified email at uib.no
Rui HeSUSTech and University of BirminghamVerified email at student.bham.ac.uk
Yew-Soon OngPresident Chair Professor of Computer Science, A*Star AI Chief Scientist, FIEEEVerified email at ntu.edu.sg