Get my own profile
Public access
View all47 articles
88 articles
available
not available
Based on funding mandates
Co-authors
- Ying WangInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
- Xiaowei Li (李晓维)Institute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
- Yu Hu (胡 瑜)Institute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
- Lei ZhangICT, CAS & JeejioVerified email at ict.ac.cn
- Shengwen LiangInstitute of computing technology, Chinese Academy of SciencesVerified email at ict.ac.cn
- Gang QuUniversity of MarylandVerified email at umd.edu
- ying zhangtongji universityVerified email at tongji.edu.cn
- Yuntan FangHuaweiVerified email at huawei.com
- Kwang-Ting (Tim) ChengChair Professor of ECE and CSE, HKUSTVerified email at ust.hk
- Yongjun Xu (徐勇军)Institute of Computing Technology, CASVerified email at ict.ac.cn
- yuan caoHohai UniversityVerified email at e.ntu.edu.sg
- Long ChengProfessor, North China Electric Power UniversityVerified email at ncepu.edu.cn
- Shuai ChenJiangxi Science & Technology Normal UniversityVerified email at utah.edu
- Xiaoqing WenKyushu Institute of TechnologyVerified email at cse.kyutech.ac.jp
- Krishnendu ChakrabartyFulton Professor of Microelectronics, School of Electrical and Computer and Energy EngineeringVerified email at asu.edu
- Yuanqing ChengAssistant Professor of Electrical Engineering, Beihang UniversityVerified email at ieee.org
- Guihai YanAssociate Professor of Computer Science, Institute of Computing Technology, CASVerified email at ict.ac.cn
- Junfeng FanOpen Security ResearchVerified email at opsefy.com
- Zebo PengProfessor of Computer Systems, Linkoping UniversityVerified email at liu.se
- Yongchen Wang | 汪雍琛Alibaba Group Holding LimitedVerified email at alibaba-inc.com