Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
chao wuZhejiang UniversityVerified email at zju.edu.cn
Jie ZhangETH Zurich, Institute of Information SecurityVerified email at inf.ethz.ch
Bo Livivo Mobile Communication. Former researcher @ Tencent Youtu Lab/ Nanjing UniversityVerified email at vivo.com
Shuang WuYoutu Lab, TencentVerified email at tencent.com
Jianghe XuTencent Youtu LabVerified email at tencent.com
shouhong dingtencentVerified email at tencent.com
Cheng WanCornell UniversityVerified email at cornell.edu
Hongyuan Yu 俞宏远Xiaomi Inc.<< NLPR, CASIAVerified email at cripac.ia.ac.cn
Bo ZhuGeorgia Institute of TechnologyVerified email at gatech.edu
Duowen ChenGeorgia Institute of TechnologyVerified email at gatech.edu
Baining GuoDistinguished Scientist, Microsoft ResearchVerified email at microsoft.com
Xin TongResearch Manager, Anuttacon ([email protected])Verified email at siggraph.org
Jiaolong YangMicrosoft ResearchVerified email at microsoft.com
Fan (Terry) ZhangZhejiang UniversityVerified email at zju.edu.cn
Greg TurkProfessor, Georgia TechVerified email at cc.gatech.edu
Barnabás BörcsökGraduate StudentVerified email at gatech.edu
Chunyuan DengRice UniversityVerified email at rice.edu
Didi ZhuZhejiang UniversityVerified email at zju.edu.cn
Zexi LiUniversity of Cambridge | Zhejiang UniversityVerified email at cam.ac.uk
Junwei ZhouUniversity of Michigan, Ann ArborVerified email at umich.edu