Get my own profile
Public access
View all74 articles
77 articles
available
not available
Based on funding mandates
Co-authors
David Dagan FengThe University of SydneyVerified email at sydney.edu.au
Po YangProfessor of Pervasive Intelligence at the Sheffield UniversityVerified email at sheffield.ac.uk
Huating LiShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Jinman KimSchool of Computer Science, University of SydneyVerified email at sydney.edu.au
C. L. Philip ChenChair Professor, South China University of Technology, Philip.Chen@ieee.orgVerified email at scut.edu.cn
Lei ZhuHong Kong University of Science and TechnologyVerified email at ust.hk
Hanqiu SunThe Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
YOUNHYUN JUNGGachon UniversityVerified email at gachon.ac.kr
Di LinAssociate Professor, Tianjin UniversityVerified email at tju.edu.cn
Rui-Min ShenProfessor of Computer Science, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Tong-Yee LeeNational Cheng-Kung UniversityVerified email at mail.ncku.edu.tw
Yongwei NieSouth China University of TechnologyVerified email at scut.edu.cn
Saba Ghazanfar AliShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Kamel AouaidjiaHenan UniversityVerified email at henu.edu.cn
Anam NazirCOMSATS university Islamabad, Wah canttVerified email at ciitwah.edu.pk
Muhammad Nadeem CheemaUniversity of Texas Health Science Center Houston, USAVerified email at uth.tmc.edu
Lizhuang Ma (马利庄)Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Yuxi JinShenzhen Institute of Advanced Technology, Chinese Academy of SciencesVerified email at siat.ac.cn
Chunxia XiaoProfessor of Computer Science, Wuhan UniversityVerified email at whu.edu.cn
Qing Zhang (张青)Sun Yat-sen UniversityVerified email at mail.sysu.edu.cn