Get my own profile
Public access
View all34 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Rujia LiInstitute for Advanced Study, Tsinghua UniversityVerified email at tsinghua.edu.cn
Prof. Shiping ChenCSIRO Data61, AustraliaVerified email at data61.csiro.au
Yi LiuJinan UniversityVerified email at jnu.edu.cn
David GalindoCTO, Valory AGVerified email at valory.xyz
Cunsheng DingProfessor of Computer Science, HKUSTVerified email at cse.ust.hk
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Jerod MichelNanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cnAlexander PottOtto von Guericke University, Faculty of MathematicsVerified email at ovgu.de
Siu-Ming YiuProfessor of Computer Science, The University of Hong KongVerified email at cs.hku.hkShengcai LiuSouthern University of Science and TechnologyVerified email at sustech.edu.cn
Ke TangProfessor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Zhengchun ZhouSouthwest Jiaotong University (Professor)Verified email at home.swjtu.edu.cn
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Yew-Soon OngPresident Chair Professor of Computer Science, FIEEEVerified email at ntu.edu.sgYue ZhouNational University of Defense TechnologyVerified email at nudt.edu.cn
Sisi DuanResearch Scientist, PhD Advisor, Tsinghua UniversityVerified email at mail.tsinghua.edu.cn
Thomas HardjonoMITVerified email at mit.edu
Qingqing YeAssistant Professor, The Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Haibo HuProfessor, Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Yulian MaoPhD student at SUSTech & PolyUVerified email at connect.polyu.hk