Get my own profile
Public access
View all162 articles
73 articles
available
not available
Based on funding mandates
Co-authors
Wenqi RenSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Huazhu FuPrincipal Scientist, IHPC, A*STARVerified email at ieee.org
Hua ZhangPh.D., Associate Professor,State Key Laboratory of Information Security Institute of InformationVerified email at iie.ac.cn
Qingming HuangUniversity of the Chinese Academy of SciencesVerified email at ucas.ac.cn
Xiaojie Guo (郭晓杰)Tianjin UniversityVerified email at tju.edu.cn
si liuBeihang UniversityVerified email at buaa.edu.cn
Changqing ZhangAssociate Professor, Tianjin UniversityVerified email at tju.edu.cn
Liang YangSchool of Artificial Intelligence, Hebei University of TechnologyVerified email at vip.qq.com
Qianqian XuInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Hassan ForooshCAE Link Professor of Computer Science, University of Central FloridaVerified email at ucf.edu
Xingxing WeiSchool of Computer Science, Beihang UniversityVerified email at buaa.edu.cn
Zhiyong Yang (杨智勇)University of Chinese Academy of Sciences (UCAS)Verified email at ucas.ac.cn
Ming-Hsuan YangUniversity of California at Merced; GoogleVerified email at ucmerced.edu
Yuanfang GuoBeihang UniversityVerified email at connect.ust.hk
Jinshan PanNanjing University of Science and TechnologyVerified email at seas.harvard.edu
Di JinTianjin University, ProfessorVerified email at tju.edu.cn
Chuan WangYoung Associate professor, IIE, CASVerified email at iie.ac.cn
Dongxiao HeTianjin University, Associate Professor of Computer ScienceVerified email at tju.edu.cn
Xiaojun JiaInstitute of Information Engineering,Chinese Academy of SciencesVerified email at iie.ac.cn
Wei Liu, IEEE/IAPR/IMA FellowDistinguished Scientist, TencentVerified email at ee.columbia.edu