Get my own profile
Public access
View all12 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Dr. Hui Xiong, Fellow of AAAS and IEEERutgers University/Baidu/HKUSTVerified email at ust.hk
- Zijun YaoUniversity of KansasVerified email at ku.edu
- Yanjie FuAssociate Professor, School of Computing and AI, Arizona State UniversityVerified email at asu.edu
- Neil Zhenqiang GongAssociate Professor, Duke UniversityVerified email at duke.edu
- Kenney NgIBM ResearchVerified email at us.ibm.com
- Ying LiRegeneron; IBM Research; Columbia UniversityVerified email at regeneron.com
- Chuanbo HuUniversity at Albany, SUNYVerified email at albany.edu
- Yanchi LiuSenior Researcher, NEC Labs AmericaVerified email at rutgers.edu
- Xin LiUniversity at Albany, IEEE Fellow, AAIA FellowVerified email at albany.edu
- Spiros PapadimitriouRutgers UniversityVerified email at rutgers.edu
- Minglei YinWest Virginia UniversityVerified email at mix.wvu.edu
- Soumya GhoshMIT-IBM Watson AI Lab, IBM ResearchVerified email at cs.brown.edu
- ChuanRen LiuThe University of Tennessee, KnoxvilleVerified email at xminer.org
- Hai HuangCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Jianying Hu, Fellow IEEE, FACMI, Fell...IBM Thomas J. Wastson Research CenterVerified email at us.ibm.com
- Yong GeAssociate Professor of MIS at University of ArizonaVerified email at email.arizona.edu
- Martin EsterDistinguished Professor of Computer Science, Simon Fraser UniversityVerified email at cs.sfu.ca
- Yao WuFacebookVerified email at fb.com
- Jie LiuNankai UniversityVerified email at nankai.edu.cn
- Xiaolong ZhengInstitute of Automation, Chinese Academy of Sciences & School of Artificial Intelligence, UCASVerified email at ia.ac.cn