Get my own profile
Public access
View all54 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Xiaoru YuanSchool of EECS, Peking UniversityVerified email at pku.edu.cn
Gennady Andrienkolead scientist @ Fraunhofer IAIS & Lamarr Institute & professor @ City University LondonVerified email at iais.fraunhofer.de
Natalia AndrienkoFraunhofer IAIS (lead scientist) & Lamarr Institute & City University London (professor)Verified email at iais.fraunhofer.de
Jie LiTianjin UniversityVerified email at tju.edu.cn
Christy Jie LiangUniversity of Technology, SydneyVerified email at uts.edu.au
Cagatay TurkayProfessor at University of WarwickVerified email at warwick.ac.uk
Richen LiuNanjing Normal UniversityVerified email at pku.edu.cn
Yuheng ZhaoFudan UniversityVerified email at fudan.edu.cn
Phong H. NguyenRedSiftVerified email at redsift.io
Xiangyang XueProfessor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn
Yun WangSenior Researcher, Microsoft ResearchVerified email at microsoft.com
Zekai ShaoFudan UniversityVerified email at fudan.edu.cn
Olivier ThonnardDirector Security Operations, AmadeusVerified email at amadeus.com
Yu ZhangUniversity of OxfordVerified email at cs.ox.ac.uk
Jiawan ZhangTianjin UniversityVerified email at tju.edu.cn
Huamin QuChair Professor, Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
Yalong YangAssistant Professor, Georgia TechVerified email at gatech.edu
Nan CaoProfessor, Intelligent Big Data Visualization Lab @ Tongji UniversityVerified email at tongji.edu.cn
Tao Gui (桂韬)复旦大学Verified email at fudan.edu.cn
Huang Xuanjing (黄萱菁)Professor of Computer Science, Fudan UniversityVerified email at fudan.edu.cn