Get my own profile
Public access
View all37 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Peng ChengProfessor, Zhejiang UniversityVerified email at zju.edu.cn
Peixin ZhangSingapore Management UniversityVerified email at smu.edu.sg
Jialuo ChenHuawei TechnologiesVerified email at zju.edu.cn
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Youcheng SunMBZUAI, Honorary SL@UoMVerified email at mbzuai.ac.ae
Xingjun MaFudan UniversityVerified email at unimelb.edu.au
Shouling JiProfessor, Zhejiang University & Georgia Institute of TechnologyVerified email at gatech.edu
Xiaohan YuanZhejiang UniversityVerified email at zju.edu.cn
JIMING CHENProfessor at Zhejiang UniversityVerified email at ieee.org
Christopher M. PoskittSingapore Management University (SMU)Verified email at smu.edu.sg
Bo LiUniversity of Illinois at Urbana–ChampaignVerified email at illinois.edu
Kui RenProfessor and Dean of Computer Science, Zhejiang University, ACM/IEEE FellowVerified email at zju.edu.cn
Xiaoxia LiuZhejiang UniversityVerified email at zju.edu.cn
Shengchao QinProfessor of Computer Science, Teesside UniversityVerified email at acm.org
hui xue阿里巴巴集团安全部资深算法专家Verified email at alibaba-inc.comJinfeng LiAlibaba GroupVerified email at alibaba-inc.com
Xiangshan Gaozhejiang universityVerified email at zju.edu.cn
Fu SONGState Key Laboratory of Computer Science, Institute of Software, Chinese Academy of SciencesVerified email at ios.ac.cn
Xingwei LinZhejiang UniversityVerified email at zju.edu.cn