Get my own profile
Public access
View all42 articles
25 articles
available
not available
Based on funding mandates
Co-authors
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Shengzhi ZhangBoston University MET CollegeVerified email at bu.edu
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Nan ZhangFacebook Inc.Verified email at indiana.edu
Yue ZhaoUniversity of Chinese Academy of SciencesVerified email at iie.ac.cn
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityVerified email at hanyang.ac.kr
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Yuxuan ChenFlorida institute of technologyVerified email at my.fit.edu
Jin Li 李进Professor @Guangzhou UniversityVerified email at gzhu.edu.cn
Haixu TangProfessor, Indiana UniversityVerified email at indiana.edu
Guozhu MengAssociate Professor with Chinese Academy of SciencesVerified email at iie.ac.cn
Tongxin LiPeking UniversityVerified email at pku.edu.cn
Ruigang LiangInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Luyi XingAssistant Professor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
Peng WangIndiana University BloomingtonVerified email at indiana.edu
Xiaojing LiaoIndiana University BloomingtonVerified email at indiana.edu
Yunhui LongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Wenrui DiaoProfessor, Shandong UniversityVerified email at sdu.edu.cn