Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
- Wei YouRenmin University of ChinaVerified email at ruc.edu.cn
- Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityVerified email at purdue.edu
- Shiqing MaUniversity of Massachusetts, AmherstVerified email at umass.edu
- Yousra AaferPostdoctoral Researcher, Purdue UniversityVerified email at purdue.edu
- Xusheng XiaoAssociate Professor, Arizona State UniversityVerified email at asu.edu
- Zhenyu WuNEC Laboratories America Inc.Verified email at nec-labs.com
- Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
- Yanjun WuInstitute of Software, Chinese Academy of SciencesVerified email at iscas.ac.cn
- Kangjie LuAssociate Professor, University of MinnesotaVerified email at umn.edu
- Xueqiang WangUniversity of Central FloridaVerified email at ucf.edu
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
- Guanhong TaoPh.D., Purdue UniversityVerified email at purdue.edu
- Feng QinThe Ohio State UniversityVerified email at cse.ohio-state.edu
- Juan ZhaiUniversity of Massachusetts, AmherstVerified email at umass.edu
- Yan CaiState Key Laboratory of Computer Science, ISCAS, ChinaVerified email at ios.ac.cn
- Daxiang DongBaiduVerified email at baidu.com
- Jiasheng JiangPurdue Ph.D. studentVerified email at purdue.edu
- Bo XueStudent of Information security, Renmin University of ChinaVerified email at ruc.edu.cn
- Yapeng YePurdue UniversityVerified email at purdue.edu
Follow
Jianjun Huang
School of Information, Renmin University of China
Verified email at ruc.edu.cn - Homepage