Get my own profile
Public access
View all55 articles
7 articles
available
not available
Based on funding mandates
Co-authors
- Xiaoru YuanSchool of EECS, Peking UniversityVerified email at pku.edu.cn
- Gennady Andrienkolead scientist @ Fraunhofer IAIS & Lamarr Institute & professor @ City University LondonVerified email at iais.fraunhofer.de
- Natalia AndrienkoFraunhofer IAIS (lead scientist) & Lamarr Institute & City University London (professor)Verified email at iais.fraunhofer.de
- Jie LiTianjin UniversityVerified email at tju.edu.cn
- Christy Jie LiangUniversity of Technology, SydneyVerified email at uts.edu.au
- Cagatay TurkayProfessor at University of WarwickVerified email at warwick.ac.uk
- Richen LiuNanjing Normal UniversityVerified email at pku.edu.cn
- Yuheng ZhaoFudan UniversityVerified email at fudan.edu.cn
- Phong H. NguyenRedSiftVerified email at redsift.io
- Xiangyang XueProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
- Yun WangSenior Researcher, Microsoft ResearchVerified email at microsoft.com
- Olivier ThonnardDirector Security Operations, AmadeusVerified email at amadeus.com
- Zekai ShaoFudan UniversityVerified email at fudan.edu.cn
- Yu ZhangUniversity of OxfordVerified email at cs.ox.ac.uk
- Jiawan ZhangTianjin UniversityVerified email at tju.edu.cn
- Nan CaoProfessor, Intelligent Big Data Visualization Lab @ Tongji UniversityVerified email at tongji.edu.cn
- Yalong YangAssistant Professor, Georgia TechVerified email at gatech.edu
- Huamin QuChair Professor, Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
- Linara AdilovaPhD student, Ruhr University BochumVerified email at ruhr-uni-bochum.de
- Min LuShenzhen UniversityVerified email at szu.edu.cn