Get my own profile
Public access
View all32 articles
7 articles
available
not available
Based on funding mandates
Co-authors
- Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Le YuNanjing University of Posts and Telecommunications, School of Computer ScienceVerified email at polyu.edu.hk
- Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
- Tao ZhangSchool of Computer Science and Engineering, Macau University of Science and TechnologyVerified email at must.edu.mo
- Yajin ZhouZhejiang UniversityVerified email at zju.edu.cn
- Zhou XUChongqing University & The Hong Kong Polytechnic UniversityVerified email at cqu.edu.cn
- Dinghao WuPennsylvania State UniversityVerified email at psu.edu
- Yuru ShaoPinterestVerified email at pinterest.com
- CHENXIONG QIANThe University of Hong KongVerified email at cs.hku.hk
- Ang ChenUniversity of MichiganVerified email at umich.edu
- TANG QIYIInformation Security Researcher, TencentVerified email at tencent.com
- Ming Fan (范铭)Xi'an Jiaotong UniversityVerified email at mail.xjtu.edu.cn
- Qiao KangRice UniversityVerified email at rice.edu
- Alvin T.S. ChanAssociate Professor, Singapore Institute of TechnologyVerified email at SingaporeTech.edu.sg
- Guozi Sun (孙国梓)Professor, Nanjing University of Posts and TelecommunicationsVerified email at njupt.edu.cn
- Muhui JiangPh.D. The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
- Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Bo AnNanyang Technological UniversityVerified email at ntu.edu.sg
- cong shiSchool of Computer Science, Georgia Institute of TechnologyVerified email at gatech.edu