Get my own profile
Public access
View all12 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Dr. Hui Xiong, Fellow of AAAS, AAAI a...Rutgers University/Baidu/HKUSTVerified email at ust.hk
Zijun YaoUniversity of KansasVerified email at ku.edu
Yanjie FuAssociate Professor, School of Computing and AI, Arizona State UniversityVerified email at asu.edu
Neil Zhenqiang GongAssociate Professor, Duke UniversityVerified email at duke.edu
Kenney NgIBM ResearchVerified email at us.ibm.com
Ying LiRegeneron; IBM Research; Columbia UniversityVerified email at regeneron.com
Chuanbo HuUniversity at Albany, SUNYVerified email at albany.edu
Xin LiUniversity at Albany, IEEE Fellow, AAIA FellowVerified email at albany.edu
Yanchi LiuSenior Researcher, NEC Labs AmericaVerified email at rutgers.edu
Spiros PapadimitriouRutgers UniversityVerified email at rutgers.edu
Minglei YinWest Virginia UniversityVerified email at mix.wvu.edu
Soumya GhoshMIT-IBM Watson AI Lab, IBM ResearchVerified email at cs.brown.edu
Hai HuangCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
ChuanRen LiuThe University of Tennessee, KnoxvilleVerified email at xminer.org
Jianying Hu, Fellow IEEE, FACMI, Fell...IBM Thomas J. Wastson Research CenterVerified email at us.ibm.com
Yong GeAssociate Professor of MIS at University of ArizonaVerified email at email.arizona.edu
Martin EsterDistinguished Professor of Computer Science, Simon Fraser UniversityVerified email at cs.sfu.ca
Yao WuFacebookVerified email at fb.com
Jie LiuNankai UniversityVerified email at nankai.edu.cn
Xiaolong ZhengInstitute of Automation, Chinese Academy of Sciences & School of Artificial Intelligence, UCASVerified email at ia.ac.cn