Get my own profile
Public access
View all23 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Yu-Kun LaiProfessor, Cardiff UniversityVerified email at cs.cf.ac.uk
Ping TanHong Kong University of Science and Technology (HKUST)Verified email at ust.hk
Yinda ZhangGoogle ResearchVerified email at google.com
Yong-Jin LIUComputer Science and Technology, Tsinghua UniversityVerified email at tsinghua.edu.cn
Fang LiuCommunication University of China; Tsinghua University; Chinese Academy of ChinaVerified email at cuc.edu.cn
Jian ChengInstitute of Software, CASVerified email at iscas.ac.cn
Yihong WuNational Laboratory of Pattern Recognition, Institute of Automation Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
Baowen ZhangThe Hong Kong University of Science and TechnologyVerified email at connect.ust.hk
Guozhen ZhaoAssociate Researcher, Institute of Psychology, Chinese Academy of SciencesVerified email at psych.ac.cn
Zhaopeng CuiZhejiang UniversityVerified email at zju.edu.cn
Dexin ZuoPhD student, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Lei HuInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Changqing ZOU (ZOU Changqing - 邹...Zhejiang UniversityVerified email at zju.edu.cn
Stephen LinMicrosoft Research AsiaVerified email at microsoft.com
Yangang WangAssociate professor at Southeast UniversityVerified email at microsoft.com
Jian ShiChinese Academy of SciencesVerified email at ia.ac.cn
Xiaopeng ZHANGNational Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
Zeyuan HuangInstitute of Software, Chinese Academy of SciencesVerified email at iscas.ac.cn
Wentian QuInstitute of Software Chinese Academy of SciencesVerified email at iscas.ac.cn
Keqi ChenUniversity of StrasbourgVerified email at unistra.fr