Get my own profile
Public access
View all57 articles
11 articles
available
not available
Based on funding mandates
Co-authors
- Xiaoru YuanSchool of EECS, Peking UniversityVerified email at pku.edu.cn
- Gennady Andrienkolead scientist @ Fraunhofer IAIS & Lamarr Institute & professor @ City University LondonVerified email at iais.fraunhofer.de
- Natalia AndrienkoFraunhofer IAIS (lead scientist) & Lamarr Institute & City University London (professor)Verified email at iais.fraunhofer.de
- Jie LiTianjin UniversityVerified email at tju.edu.cn
- Christy Jie LiangUniversity of Technology, SydneyVerified email at uts.edu.au
- Richen LiuNanjing Normal UniversityVerified email at pku.edu.cn
- Cagatay TurkayProfessor at University of WarwickVerified email at warwick.ac.uk
- Yuheng ZhaoFudan UniversityVerified email at fudan.edu.cn
- Phong H. NguyenRedSiftVerified email at redsift.io
- Xiangyang XueProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Yun WangSenior Researcher, Microsoft ResearchVerified email at microsoft.com
- Zekai ShaoFudan UniversityVerified email at fudan.edu.cn
- Olivier ThonnardDirector Security Operations, AmadeusVerified email at amadeus.com
- Yu ZhangUniversity of OxfordVerified email at cs.ox.ac.uk
- Jiawan ZhangTianjin UniversityVerified email at tju.edu.cn
- Huamin QuChair Professor, Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
- Nan CaoProfessor, Intelligent Big Data Visualization Lab @ Tongji UniversityVerified email at tongji.edu.cn
- Tao Gui (桂韬)复旦大学Verified email at fudan.edu.cn
- Yalong YangAssistant Professor, Georgia TechVerified email at gatech.edu
- Huang Xuanjing (黄萱菁)Professor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn