Get my own profile
Public access
View all14 articles
14 articles
available
not available
Based on funding mandates
Co-authors
- Jiong ShiVice Professor, Zhejiang Wanli UniversityVerified email at zwu.edu.cn
- Xin WangFIEEE, Professor, Fudan UniversityVerified email at fudan.edu.cn
- Xiaojun YuanUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Liangbin LiUniversity of California, IrvineVerified email at uci.edu
- Wei NiFIEEE, AAIA Fellow, Senior Principal Scientist, Information Security & Privacy Group, CSIROVerified email at csiro.au
- Tongtong LiProfessor of ECE, Michigan State UniversityVerified email at egr.msu.edu
- Tianlong SongPhD, Principal Software Development Engineer, Machine Learning & Big Data, ZillowVerified email at zillow.com
- Hangguan ShanZhejiang UniversityVerified email at zju.edu.cn
- Ahmed AlahmadiTaibah UniversityVerified email at taibahu.edu.sa
- Feng WangGuangdong University of TechnologyVerified email at gdut.edu.cn