Get my own profile
Public access
View all58 articles
5 articles
available
not available
Based on funding mandates
Co-authors
hui xue阿里巴巴集团安全部资深算法专家Verified email at alibaba-inc.comYuefeng ChenAlibaba GroupVerified email at alibaba-inc.com
Qingming HuangUniversity of the Chinese Academy of SciencesVerified email at ucas.ac.cn
Zhiyong Yang (杨智勇)University of Chinese Academy of Sciences (UCAS)Verified email at ucas.ac.cn
Xiaofeng MaoAlibaba GroupVerified email at alibaba-inc.comXiaochun CaoSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Xiaodan LiAlibaba Group, ChinaVerified email at alibaba-inc.com
Jianfeng DongZhejiang Gongshang UniversityVerified email at zjgsu.edu.cn
Xuan Jin(金炫)USTC, UCAS, Alibaba GroupVerified email at alibaba-inc.com
Nenghai YuUniversity of Science and Technology of ChinaVerified email at ustc.edu.cnweiming zhangUniversity of Science and Technology of ChinaVerified email at ustc.edu.cn
Shouling JiProfessor, Zhejiang University & Georgia Institute of TechnologyVerified email at gatech.edu
Shuhui Wang(王树徽)Professor, Institute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Da ChenAssistant Professor at University of BathVerified email at bath.ac.ukHang SuAssociated Professor, Tsinghua UniversityVerified email at mail.tsinghua.edu.cn
Shilong Bao(包世龙)University of Chinese Academy of Sciences (UCAS)Verified email at ucas.ac.cn
Ranjie DuanAlibaba GroupVerified email at alibaba-inc.comYuhong Li (李裕宏)Alibaba GroupVerified email at alibaba-inc.com
Shaokai YeAppleVerified email at apple.com
Feng Mao (毛锋)ZheJiang UniversityVerified email at zju.edu.cn