Get my own profile
Public access
View all10 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Hui Xiong, Fellow of AAAS and IEEERutgers University/Baidu/HKUSTVerified email at ust.hk
Zijun YaoUniversity of KansasVerified email at ku.edu
Yanjie FuAssociate Professor, School of Computing and AI, Arizona State UniversityVerified email at asu.edu
Neil Zhenqiang GongAssistant Professor, Duke UniversityVerified email at duke.edu
Kenney NgIBM ResearchVerified email at us.ibm.com
Ying LiRegeneron; IBM Research; Columbia UniversityVerified email at regeneron.com
Yanchi LiuResearch Staff Member, NEC Labs AmericaVerified email at rutgers.edu
Spiros PapadimitriouRutgers UniversityVerified email at rutgers.edu
Chuanbo HuUniversity at Albany, SUNYVerified email at albany.edu
Soumya GhoshMIT-IBM Watson AI Lab, IBM ResearchVerified email at cs.brown.edu
Xin LiUniversity at Albany, IEEE Fellow, AAIA FellowVerified email at albany.edu
ChuanRen LiuThe University of Tennessee, KnoxvilleVerified email at xminer.org
Minglei YinWest Virginia UniversityVerified email at mix.wvu.edu
Hai HuangCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jianying Hu, Fellow IEEE, FACMI, Fell...IBM Thomas J. Wastson Research CenterVerified email at us.ibm.com
Yong GeAssociate Professor of MIS at University of ArizonaVerified email at email.arizona.edu
Martin EsterDistinguished Professor of Computer Science, Simon Fraser UniversityVerified email at cs.sfu.ca
Yao WuFacebookVerified email at fb.com
Jie LiuNankai UniversityVerified email at nankai.edu.cn
Xiaolong ZhengChinese Academy of SciencesVerified email at ia.ac.cn