Get my own profile
Public access
View all29 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Peixin ZhangSingapore Management UniversityVerified email at smu.edu.sg
Peng ChengProfessor, Zhejiang UniversityVerified email at zju.edu.cn
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Youcheng SunLecturer, University of ManchesterVerified email at manchester.ac.uk
Jialuo ChenZhejiang UniversityVerified email at zju.edu.cn
Xingjun MaSchool of Computer Science, Fudan UniversityVerified email at unimelb.edu.au
Shouling JiProfessor, Zhejiang University & Georgia Institute of TechnologyVerified email at gatech.edu
Christopher M. PoskittSingapore Management University (SMU)Verified email at smu.edu.sg
Bo LiUniversity of Illinois at Urbana–ChampaignVerified email at illinois.edu
Shengchao QinProfessor of Computer Science, Teesside UniversityVerified email at tees.ac.uk
Fu SONGState Key Laboratory of Computer Science, Institute of Software, Chinese Academy of SciencesVerified email at ios.ac.cn
Xiangshan Gaozhejiang universityVerified email at zju.edu.cn
Yuqi ChenAssistant Professor, Shanghaitech UniversityVerified email at shanghaitech.edu.cn
Xiaohan YuanZhejiang UniversityVerified email at zju.edu.cn
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
hui xue阿里巴巴集团安全部资深算法专家Verified email at alibaba-inc.com
Jinfeng LiAlibaba GroupVerified email at alibaba-inc.com
JIMING CHENProfessor at Zhejiang UniversityVerified email at ieee.org
ZHANG MengdiSingapore Management UniversityVerified email at smu.edu.sg