Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Wei YouRenmin University of ChinaVerified email at ruc.edu.cn
Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityVerified email at purdue.edu
Shiqing MaUniversity of Massachusetts, AmherstVerified email at umass.edu
Yousra AaferPostdoctoral Researcher, Purdue UniversityVerified email at purdue.edu
Xusheng XiaoAssociate Professor, Arizona State UniversityVerified email at asu.edu
Zhenyu WuNEC Laboratories America Inc.Verified email at nec-labs.com
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Kangjie LuAssociate Professor, University of MinnesotaVerified email at umn.edu
Xueqiang WangUniversity of Central FloridaVerified email at ucf.edu
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
Yanjun WuInstitute of Software, Chinese Academy of SciencesVerified email at iscas.ac.cn
Feng QinThe Ohio State UniversityVerified email at cse.ohio-state.edu
Juan ZhaiUniversity of Massachusetts, AmherstVerified email at umass.edu
Guanhong TaoPh.D. Candidate, Purdue UniversityVerified email at purdue.edu
Daxiang DongBaiduVerified email at baidu.com
Yan CaiState Key Laboratory of Computer Science, ISCAS, ChinaVerified email at ios.ac.cn
Hongcheng LiGienTechVerified email at gientech.com
Bo XueStudent of Information security, Renmin University of ChinaVerified email at ruc.edu.cn
Peng WangIndiana University BloomingtonVerified email at indiana.edu
Follow

Jianjun Huang
School of Information, Renmin University of China
Verified email at ruc.edu.cn - Homepage