Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Quanquan GuAssociate Professor of Computer Science, UCLAEmail verificata su cs.ucla.edu
- Lu LinAssistant Professor of Information Science and Technology, Penn State UniversityEmail verificata su psu.edu
- Dongruo ZhouIndiana University BloomingtonEmail verificata su iu.edu
- Yuan CaoThe University of Hong KongEmail verificata su hku.hk
- Pan XuDuke UniversityEmail verificata su duke.edu
- Difan ZouThe University of Hong KongEmail verificata su cs.hku.hk
- Lingxiao WangToyota Technological Institute at ChicagoEmail verificata su ttic.edu
- Saket SatheSenior Applied Scientist, AmazonEmail verificata su amazon.com
- Charu AggarwalDistinguished Research Staff Member, IBM T. J. Watson Research CenterEmail verificata su us.ibm.com
- Ting WangStony Brook UniversityEmail verificata su cs.stonybrook.edu
- Fenglong MaAssistant Professor at Pennsylvania State UniversityEmail verificata su psu.edu
- Dongwon LeeProfessor, The Pennsylvania State UniversityEmail verificata su psu.edu
- Xiao ZhangCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Jinfeng Yi (易津锋)Email verificata su jd.com
- Jian MaRay and Stephanie Lane Professor of Computational Biology, Carnegie Mellon UniversityEmail verificata su cs.cmu.edu
- David EvansUniversity of Virginia, Computer ScienceEmail verificata su virginia.edu
- Anna C SquicciariniPennsylvania State UniversityEmail verificata su psu.edu
- Amulya YadavAssistant Professor, Penn StateEmail verificata su psu.edu
- Bodo RosenhahnL3S Research Center / Leibniz Universität HannoverEmail verificata su tnt.uni-hannover.de
- Bo LiUniversity of Illinois at Urbana–ChampaignEmail verificata su illinois.edu
Segui
Jinghui Chen
Assistant Professor of Information Sciences and Technology, Penn State University
Email verificata su psu.edu - Home page