Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Hui Xiong, Fellow of AAAS and IEEERutgers University/Baidu/HKUSTVerified email at ust.hk
Zijun YaoUniversity of KansasVerified email at ku.edu
Yanjie FuAssistant Professor, University of Central FloridaVerified email at ucf.edu
Neil Zhenqiang GongAssistant Professor, Duke UniversityVerified email at duke.edu
Kenney NgIBM ResearchVerified email at us.ibm.com
Ying LiRegeneron; IBM Research; Columbia UniversityVerified email at regeneron.com
Yanchi LiuResearch Staff Member, NEC Labs AmericaVerified email at rutgers.edu
Spiros PapadimitriouRutgers UniversityVerified email at rutgers.edu
Deguang KongGoogleVerified email at google.com
Haifeng ChenNEC Laboratories America, Inc.Verified email at chacuo.net
Soumya GhoshMIT-IBM Watson AI Lab, IBM ResearchVerified email at cs.brown.edu
Chuanbo HuWest Virginia UniversityVerified email at mail.wvu.edu
ChuanRen LiuThe University of Tennessee, KnoxvilleVerified email at xminer.org
Xin LiWest Virginia University, IEEE FellowVerified email at mail.wvu.edu
Jianying Hu, Fellow IEEE, FACMI, Fell...IBM Thomas J. Wastson Research CenterVerified email at us.ibm.com
Hai HuangCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yong GeAssociate Professor of MIS at University of ArizonaVerified email at email.arizona.edu
Martin EsterDistinguished Professor of Computer Science, Simon Fraser UniversityVerified email at cs.sfu.ca
Yao WuFacebookVerified email at fb.com
Minglei YinWest Virginia UniversityVerified email at mix.wvu.edu