Crea il mio profilo
Accesso pubblico
Visualizza tutto56 articoli
10 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xiaoru YuanSchool of EECS, Peking UniversityEmail verificata su pku.edu.cn
- Gennady Andrienkolead scientist @ Fraunhofer IAIS & Lamarr Institute & professor @ City University LondonEmail verificata su iais.fraunhofer.de
- Natalia AndrienkoFraunhofer IAIS (lead scientist) & Lamarr Institute & City University London (professor)Email verificata su iais.fraunhofer.de
- Jie LiTianjin UniversityEmail verificata su tju.edu.cn
- Christy Jie LiangUniversity of Technology, SydneyEmail verificata su uts.edu.au
- Richen LiuNanjing Normal UniversityEmail verificata su pku.edu.cn
- Cagatay TurkayProfessor at University of WarwickEmail verificata su warwick.ac.uk
- Yuheng ZhaoFudan UniversityEmail verificata su fudan.edu.cn
- Phong H. NguyenRedSiftEmail verificata su redsift.io
- Xiangyang XueProfessor of Computer Science, Fudan UniversityEmail verificata su fudan.edu.cn
- Yun WangSenior Researcher, Microsoft ResearchEmail verificata su microsoft.com
- Zekai ShaoFudan UniversityEmail verificata su fudan.edu.cn
- Olivier ThonnardDirector Security Operations, AmadeusEmail verificata su amadeus.com
- Yu ZhangUniversity of OxfordEmail verificata su cs.ox.ac.uk
- Jiawan ZhangTianjin UniversityEmail verificata su tju.edu.cn
- Huamin QuChair Professor, Hong Kong University of Science and TechnologyEmail verificata su cse.ust.hk
- Nan CaoProfessor, Intelligent Big Data Visualization Lab @ Tongji UniversityEmail verificata su tongji.edu.cn
- Yalong YangAssistant Professor, Georgia TechEmail verificata su gatech.edu
- Tao Gui (桂韬)复旦大学Email verificata su fudan.edu.cn
- Huang Xuanjing (黄萱菁)Professor of Computer Science, Fudan UniversityEmail verificata su fudan.edu.cn