Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Da YanIndiana University BloomingtonEmail verificata su iu.edu
- Changji LiPhD of Computer Science, CUHKEmail verificata su cse.cuhk.edu.hk
- Yifan HOUETH ZurichEmail verificata su inf.ethz.ch
- Juncheng FangPhD Student, UC IrvineEmail verificata su uci.edu
- ZHAO YunjianThe Chinese University of Hong KongEmail verificata su cse.cuhk.edu.hk
- Qizhen ZhangUniversity of TorontoEmail verificata su cs.toronto.edu
- Rong-Hua LiBeijing Institute of TechnologyEmail verificata su bit.edu.cn
- Boon Thau LooRCA Professor of Computer and Information Science, Associate Dean, UPennEmail verificata su seas.upenn.edu
- Jinfeng LiThe Chinese University of Hong KongEmail verificata su cse.cuhk.edu.hk
- Yanghua PengByteDance Inc.Email verificata su cs.hku.hk
- Chuanxiong GuoSysnetome.comEmail verificata su ieee.org
- Ming-Chang YangAssociate Professor, Department of Computer Science & Engineering at Chinese University of HongEmail verificata su cse.cuhk.edu.hk
- Yuzhen HuangMetaThe Chinese University of Hong KongEmail verificata su cse.cuhk.edu.hk
- M. Tamer ÖzsuUniversity Professor, University of WaterlooEmail verificata su uwaterloo.ca
- Vincent LiuUniversity of PennsylvaniaEmail verificata su seas.upenn.edu
- Bin ShaoMicrosoft Research (Beijing, China)Email verificata su microsoft.com
- Zhenkun CaiThe Chinese University of Hong KongEmail verificata su cse.cuhk.edu.hk
- Guimu GuoAssistant Professor, Rowan UniversityEmail verificata su uab.edu
- Miao Mogami L.Fortinet, Inc.Email verificata su fortinet.com