Get my own profile
Public access
View all32 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Le YuNanjing University of Posts and Telecommunications, School of Computer ScienceVerified email at polyu.edu.hk
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityVerified email at cse.tamu.edu
Tao ZhangSchool of Computer Science and Engineering, Macau University of Science and TechnologyVerified email at must.edu.mo
Yajin ZhouZhejiang UniversityVerified email at zju.edu.cn
Zhou XUChongqing University & The Hong Kong Polytechnic UniversityVerified email at cqu.edu.cn
Dinghao WuPennsylvania State UniversityVerified email at psu.edu
Yuru ShaoPinterestVerified email at pinterest.com
CHENXIONG QIANThe University of Hong KongVerified email at cs.hku.hk
Ang ChenUniversity of MichiganVerified email at umich.edu
TANG QIYIInformation Security Researcher, TencentVerified email at tencent.com
Ming Fan (范铭)Xi'an Jiaotong UniversityVerified email at mail.xjtu.edu.cn
Qiao KangRice UniversityVerified email at rice.edu
Alvin T.S. ChanAssociate Professor, Singapore Institute of TechnologyVerified email at SingaporeTech.edu.sg
Guozi Sun (孙国梓)Professor, Nanjing University of Posts and TelecommunicationsVerified email at njupt.edu.cn
Muhui JiangPh.D. The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Bo AnNanyang Technological UniversityVerified email at ntu.edu.sg
cong shiSchool of Computer Science, Georgia Institute of TechnologyVerified email at gatech.edu