Get my own profile
Public access
View all50 articles
16 articles
available
not available
Based on funding mandates
Co-authors
Yike GuoDept of CSE, The Hong Kong University of Science and TechnologyVerified email at ust.hk
Hao DongAssistant Professor at Peking UniversityVerified email at pku.edu.cn
Fei WuProfessor of Computer Science, Zhejiang UniversityVerified email at cs.zju.edu.cn
Kun KuangZhejiang UniversityVerified email at zju.edu.cn
Jun XIAO (肖俊)Institute of Artificial Intelligence, Zhejiang UniversityVerified email at zju.edu.cn
Fengda Zhang (张凤达)Nanyang Technological University (NTU) | Zhejiang University (ZJU)Verified email at ntu.edu.sg
Akara Supratak, PhDAssistant Professor of Computer Science, Mahidol UniversityVerified email at mahidol.edu
Tao ShenZhejiang UniversityVerified email at zju.edu.cn
Simon HuAssistant Professor at Zhejiang UnviersityVerified email at zju.edu.cn
Jie ZhangETH Zurich, Institute of Information SecurityVerified email at inf.ethz.ch
PRN ChildsImperial College LondonVerified email at imperial.ac.uk
Moustafa GhanemProfessor, Middlesex University London, Visiting Imperial College London, Nile University CairoVerified email at imperial.ac.uk
Dilshan SilvaPost Doc, Imperial College LondonVerified email at imperial.ac.uk
Orestis TsinalisImperial College LondonVerified email at imperial.ac.uk
Zhen WeiPhD, Imperial College LondonVerified email at ic.ac.uk
Liuqing ChenZJU-100 Young Professor at Zhejiang UniversityVerified email at zju.edu.cn
Xin XiaChief Expert of the Software Engineering Application Technology, Huawei Technologies, ChinaVerified email at acm.org
Li GuoSenior Lecturer in Computing, Manchester Metropolitan UniversityVerified email at mmu.ac.uk
Paul M. MatthewsEdmond and Lily Safra Chair, Professor of Clinical Neurosciences, Imperial College LondonVerified email at imperial.ac.uk
Binbing LiaoZhejiang UniversityVerified email at zju.edu.cn