Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yunsi FeiProfessor of Electrical and Computer Engineering, Northeastern UniversityVerified email at ece.neu.edu
- Yukui LuoUniversity of Massachusetts DartmouthVerified email at umassd.edu
- Yanzhi WangNortheastern UniversityVerified email at northeastern.edu
- Xiaolin Xu (徐啸林)Northeastern UniversityVerified email at northeastern.edu
- Siyue WangResearch Scientist, MicrosoftVerified email at northeastern.edu
- pu zhaoNortheastern UniversityVerified email at husky.neu.edu
- Xue LinNortheastern UniversityVerified email at northeastern.edu
- Majid SabbaghNortheastern UniversityVerified email at husky.neu.edu
- Thomas WahlNortheastern University, Boston, USAVerified email at northeastern.edu
- Aidong Adam DingAssociate Professor of Mathematics, Northeastern UniversityVerified email at neu.edu
- Ruyi DingNortheastern UniversityVerified email at northeastern.edu
- TIANHONG XUPhd student, Northeastern UniversityVerified email at northeastern.edu
- Hongjia LiApplied Scientist, AmazonVerified email at amazon.com
- Geng YuanUniversity of GeorgiaVerified email at uga.edu
- Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
- Kalikinkar MandalAssistant Professor at University of New Brunswick, FrederictonVerified email at uwaterloo.ca
- Raghvendra RohitLead Cryptographer, Technology Innovation Institute, Abu DhabiVerified email at tii.ae
- Nusa ZidaricLeiden UniversityVerified email at liacs.leidenuniv.nl
- Anantha ChandrakasanDean of Engineering, Massachusetts Institute of TechnologyVerified email at mit.edu
- Kyungmi LeePh.D. Student, Massachusetts Institute of TechnologyVerified email at mit.edu