Get my own profile
Public access
View all9 articles
29 articles
available
not available
Based on funding mandates
Co-authors
- Shaozi Li厦门大学智能科学与技术系教授Verified email at xmu.edu.cn
- Jinyi LongCollege of Information Science and Technology, Jinan UniversityVerified email at jnu.edu.cn
- Yaojin LinMinnan Normal UniversityVerified email at mnnu.edu.cn
- Hanrui WuVerified email at hku.hk
- Guodong DuYanshan University, ChinaVerified email at ieee.org
- Jinghua LiuDepartment of Computer Science and Technology, Huaqiao University, Xiamen.Verified email at hqu.edu.cn
- Zhiming LuoXiamen UniversityVerified email at xmu.edu.cn
- Min JIANG 江敏Professor, Xiamen UniversityVerified email at xmu.edu.cn
- Professor Kay Chen TANChair Professor, Dept. of Data Science & Artificial Intelligence, Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Jiye Liang山西大学计算智能与中文信息处理教育部重点实验室教授Verified email at sxu.edu.cn
- Xindong Wu (吴信东)Hefei University of TechnologyVerified email at hfut.edu.cn
- Qinghua HuProfessor of Computer Science, Tianjin UniversityVerified email at tju.edu.cn
- Hong-Bo ZhangSchool of Computer Science and technology, Huaqiao UniversityVerified email at hqu.edu.cn
- Guoxu ZhouGuangdong University of TechnologyVerified email at ieee.org
- Zhi-An HuangCity University of Hong Kong (Dongguan)Verified email at cityu-dg.edu.cn
- Edmond Q. WuDepartment of Computer Science and Engineering, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Yong TangSouth China Normal University