Get my own profile
Public access
View all58 articles
12 articles
available
not available
Based on funding mandates
Co-authors
Xiaoru YuanSchool of EECS, Peking UniversityVerified email at pku.edu.cn
Gennady Andrienkolead scientist @ Fraunhofer IAIS & Lamarr Institute & professor @ City University LondonVerified email at iais.fraunhofer.de
Natalia AndrienkoFraunhofer IAIS (lead scientist) & Lamarr Institute & City University London (professor)Verified email at iais.fraunhofer.de
Jie LiTianjin UniversityVerified email at tju.edu.cn
Richen LiuNanjing Normal UniversityVerified email at pku.edu.cn
Cagatay TurkayProfessor at University of WarwickVerified email at warwick.ac.uk
Christy Jie LiangUniversity of Technology, SydneyVerified email at uts.edu.au
Yuheng ZhaoFudan UniversityVerified email at fudan.edu.cn
Zekai ShaoFudan UniversityVerified email at fudan.edu.cn
Yun WangSenior Researcher, Microsoft ResearchVerified email at microsoft.com
Xiangyang XueProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Phong H. NguyenRedSiftVerified email at redsift.io
Yu ZhangUniversity of OxfordVerified email at cs.ox.ac.uk
Huang Xuanjing (黄萱菁)Professor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Olivier ThonnardDirector Security Operations, AmadeusVerified email at amadeus.com
Huamin QuChair Professor, Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Jiawan ZhangTianjin UniversityVerified email at tju.edu.cn
Tao Gui (桂韬)复旦大学Verified email at fudan.edu.cn
Yalong YangAssistant Professor, Georgia TechVerified email at gatech.edu
Nan CaoProfessor, Intelligent Big Data Visualization Lab @ Tongji UniversityVerified email at tongji.edu.cn