Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Kehuan ZhangThe Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Xiangyu LiuAlibaba GroupEmail verificata su alibaba-inc.com
- Zhou LiAssistant Professor, University of California, IrvineEmail verificata su uci.edu
- Zhe ZhouFudan UniversityEmail verificata su fudan.edu.cn
- Shanqing GuoEmail verificata su sdu.edu.cn
- Jiongyi ChenNational University of Defense TechnologyEmail verificata su nudt.edu.cn
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonEmail verificata su indiana.edu
- Fenghao XuThe Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Qingchuan ZhaoCity University of Hong KongEmail verificata su cityu.edu.hk
- Zhiqiang LinDistinguished Professor of Engineering, The Ohio State UniversityEmail verificata su cse.ohio-state.edu
- Menghan SunPhD Student, The Chinese University of Hong KongEmail verificata su link.cuhk.edu.hk
- Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Ronghai YangInformation Enginnering Department, The Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Wing Cheong LauProfessor, Department of Information Engineering, The Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Patrick TagueCarnegie Mellon UniversityEmail verificata su cmu.edu
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Kan YuanIndiana University Computer Science DepartmentEmail verificata su indiana.edu
- Feng QianAssociate Professor at University of Southern CaliforniaEmail verificata su usc.edu
- Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Xianghang MiUSTCEmail verificata su ustc.edu.cn