Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yu KongMichigan State U, Assistant Professor; ACTION Lab, DirectorEmail verificata su msu.edu
- Qi YuProfessor, Rochester Institute of TechnologyEmail verificata su rit.edu
- Yi XuOPPO US Research CenterEmail verificata su oppo.com
- Libing ZengTexas A&M UniversityEmail verificata su tamu.edu
- Zhong LiInnopeak Technology, OPPO US Research CenterEmail verificata su udel.edu
- Lele ChenResearch Scientist @ Sony AIEmail verificata su sony.com
- Junsong YuanState University of New York at BuffaloEmail verificata su buffalo.edu
- Yuansheng ZhuRochester Institute of TechnologyEmail verificata su g.rit.edu
- Lichang ChenUniversity of Maryland; Google DeepmindEmail verificata su cs.umd.edu
- Heng HuangBrendan Iribe Endowed Professor in Computer Science, University Maryland College ParkEmail verificata su umd.edu
- Nima KalantariAssistant Professor at Texas A&M UniversityEmail verificata su tamu.edu
- Xinmiao LinRochester Institute of TechnologyEmail verificata su rit.edu
- Zizheng LiuTencentEmail verificata su tencent.com
- Hanbin HongUniversity of ConnecticutEmail verificata su uconn.edu
- Yuan HongUniversity of ConnecticutEmail verificata su uconn.edu
- Xiwen DengxiongRochester Institute of TechnologyEmail verificata su g.rit.edu
- Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyEmail verificata su rit.edu
- Yifan LiPhD of Michigan State UniversityEmail verificata su msu.edu
- Huan LiuRegents Professor, Arizona State UniversityEmail verificata su asu.edu
- Tianlong ChenIncoming Asst. Professor, CS@UNC Chapel Hill; PostDoc, CSAIL@MIT+BMI@Harvard; Ph.D., ECE@UT AustinEmail verificata su mit.edu