Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityEmail verificata su cs.purdue.edu
- Wei YouRenmin University of ChinaEmail verificata su ruc.edu.cn
- Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Shiqing MaUniversity of Massachusetts, AmherstEmail verificata su umass.edu
- Yousra AaferPostdoctoral Researcher, Purdue UniversityEmail verificata su purdue.edu
- Xusheng XiaoAssociate Professor, Arizona State UniversityEmail verificata su asu.edu
- Zhenyu WuNEC Laboratories America Inc.Email verificata su nec-labs.com
- Ninghui LiProfessor of Computer Science, Purdue UniversityEmail verificata su cs.purdue.edu
- Kangjie LuAssociate Professor, University of MinnesotaEmail verificata su umn.edu
- Xueqiang WangUniversity of Central FloridaEmail verificata su ucf.edu
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonEmail verificata su indiana.edu
- Yanjun WuInstitute of Software, Chinese Academy of SciencesEmail verificata su iscas.ac.cn
- Feng QinThe Ohio State UniversityEmail verificata su cse.ohio-state.edu
- Juan ZhaiUniversity of Massachusetts, AmherstEmail verificata su umass.edu
- Guanhong TaoPh.D. Candidate, Purdue UniversityEmail verificata su purdue.edu
- Yan CaiState Key Laboratory of Computer Science, ISCAS, ChinaEmail verificata su ios.ac.cn
- Daxiang DongBaiduEmail verificata su baidu.com
- Bo XueStudent of Information security, Renmin University of ChinaEmail verificata su ruc.edu.cn
- Yapeng YePurdue UniversityEmail verificata su purdue.edu
- ZHUO ZHANGPostdoc, Purdue UniversityEmail verificata su purdue.edu
Segui
Jianjun Huang
School of Information, Renmin University of China
Email verificata su ruc.edu.cn - Home page