Get my own profile
Public access
View all44 articles
15 articles
available
not available
Based on funding mandates
Co-authors
- Yike GuoDept of CSE, The Hong Kong University of Science and TechnologyVerified email at ust.hk
- Hao DongAssistant Professor at Peking UniversityVerified email at pku.edu.cn
- Fei WuProfessor of Computer Science, Zhejiang UniversityVerified email at cs.zju.edu.cn
- Kun KuangZhejiang UniversityVerified email at zju.edu.cn
- Jun XIAOInstitute of Artificial Intelligence, Zhejiang UniversityVerified email at zju.edu.cn
- Fengda ZhangZhejiang University | Nanyang Technological UniversityVerified email at zju.edu.cn
- Akara Supratak, PhDAssistant Professor of Computer Science, Mahidol UniversityVerified email at mahidol.edu
- Jie ZhangETH Zurich, Institute of Information SecurityVerified email at inf.ethz.ch
- Tao ShenZhejiang UniversityVerified email at zju.edu.cn
- Simon HuAssistant Professor at Zhejiang UnviersityVerified email at zju.edu.cn
- PRN ChildsImperial College LondonVerified email at imperial.ac.uk
- Moustafa GhanemProfessor, Middlesex University London, Visiting Imperial College London, Nile University CairoVerified email at imperial.ac.uk
- Zhen WeiPhD, Imperial College LondonVerified email at ic.ac.uk
- Li GuoSenior Lecturer in Computing, Manchester Metropolitan UniversityVerified email at mmu.ac.uk
- Xin XiaDirector of the Software Engineering Application Technology Lab, Huawei Technologies, ChinaVerified email at acm.org
- Dilshan SilvaPost Doc, Imperial College LondonVerified email at imperial.ac.uk
- Orestis TsinalisImperial College LondonVerified email at imperial.ac.uk
- Liuqing ChenZJU-100 Young Professor at Zhejiang UniversityVerified email at zju.edu.cn
- Paul M. MatthewsEdmond and Lily Safra Chair, Professor of Clinical Neurosciences, Imperial College LondonVerified email at imperial.ac.uk
- Binbing LiaoZhejiang UniversityVerified email at zju.edu.cn