Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Hui Xiong, Fellow of AAAS and IEEERutgers University/Baidu/HKUSTEmail verificata su ust.hk
- Zijun YaoUniversity of KansasEmail verificata su ku.edu
- Yanjie FuAssociate Professor, School of Computing and AI, Arizona State UniversityEmail verificata su asu.edu
- Neil Zhenqiang GongAssistant Professor, Duke UniversityEmail verificata su duke.edu
- Kenney NgIBM ResearchEmail verificata su us.ibm.com
- Ying LiRegeneron; IBM Research; Columbia UniversityEmail verificata su regeneron.com
- Yanchi LiuResearch Staff Member, NEC Labs AmericaEmail verificata su rutgers.edu
- Spiros PapadimitriouRutgers UniversityEmail verificata su rutgers.edu
- Chuanbo HuUniversity at Albany, SUNYEmail verificata su albany.edu
- Xin LiUniversity at Albany, IEEE Fellow, AAIA FellowEmail verificata su albany.edu
- Soumya GhoshMIT-IBM Watson AI Lab, IBM ResearchEmail verificata su cs.brown.edu
- ChuanRen LiuThe University of Tennessee, KnoxvilleEmail verificata su xminer.org
- Hai HuangCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Minglei YinWest Virginia UniversityEmail verificata su mix.wvu.edu
- Jianying Hu, Fellow IEEE, FACMI, Fell...IBM Thomas J. Wastson Research CenterEmail verificata su us.ibm.com
- Yong GeAssociate Professor of MIS at University of ArizonaEmail verificata su email.arizona.edu
- Martin EsterDistinguished Professor of Computer Science, Simon Fraser UniversityEmail verificata su cs.sfu.ca
- Yao WuFacebookEmail verificata su fb.com
- Jie LiuNankai UniversityEmail verificata su nankai.edu.cn
- Xiaolong ZhengInstitute of Automation, Chinese Academy of Sciences & School of Artificial Intelligence, UCASEmail verificata su ia.ac.cn