Get my own profile
Public access
View all139 articles
64 articles
available
not available
Based on funding mandates
Co-authors
Wenqi RenSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Huazhu FuSenior Scientist, IHPC, A*STARVerified email at ieee.org
Hua ZhangPh.D., Associate Professor,State Key Laboratory of Information Security Institute of InformationVerified email at iie.ac.cn
Qingming HuangUniversity of the Chinese Academy of SciencesVerified email at ucas.ac.cn
Xiaojie Guo (郭晓杰)Tianjin UniversityVerified email at tju.edu.cn
si liuBeihang UniversityVerified email at buaa.edu.cn
Changqing ZhangAssociate Professor, Tianjin UniversityVerified email at tju.edu.cn
Hassan ForooshCAE Link Professor of Computer Science, University of Central FloridaVerified email at ucf.edu
Liang YangSchool of Artificial Intelligence, Hebei University of TechnologyVerified email at vip.qq.com
Qianqian XuInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Xingxing WeiSchool of Computer Science, Beihang UniversityVerified email at buaa.edu.cn
Zhiyong Yang (杨智勇)University of Chinese Academy of Sciences (UCAS)Verified email at ucas.ac.cn
Ming-Hsuan YangUniversity of California at Merced; GoogleVerified email at ucmerced.edu
Jinshan PanNanjing University of Science and TechnologyVerified email at seas.harvard.edu
Yuanfang GuoBeihang UniversityVerified email at connect.ust.hk
Di JinTianjin University, Associate ProfessorVerified email at tju.edu.cn
Chuan WangYoung Associate professor, IIE, CASVerified email at iie.ac.cn
Wei Liu, Fellow of IEEE/IAPR/IMADistinguished Scientist, TencentVerified email at ee.columbia.edu
Dongxiao HeTianjin University, Associate Professor of Computer ScienceVerified email at tju.edu.cn
Xiaojun JiaInstitute of Information Engineering,Chinese Academy of SciencesVerified email at iie.ac.cn