Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yu KongMichigan State U, Assistant Professor; ACTION Lab, DirectorVerified email at msu.edu
- Qi YuProfessor, Rochester Institute of TechnologyVerified email at rit.edu
- Yi XuOPPO US Research CenterVerified email at oppo.com
- Libing ZengTexas A&M UniversityVerified email at tamu.edu
- Zhong LiInnopeak Technology, OPPO US Research CenterVerified email at udel.edu
- Lele ChenResearch Scientist @ Sony AIVerified email at sony.com
- Junsong YuanState University of New York at BuffaloVerified email at buffalo.edu
- Yuansheng ZhuRochester Institute of TechnologyVerified email at g.rit.edu
- Lichang ChenUniversity of Maryland; Google DeepmindVerified email at cs.umd.edu
- Heng HuangBrendan Iribe Endowed Professor in Computer Science, University Maryland College ParkVerified email at umd.edu
- Nima KalantariAssistant Professor at Texas A&M UniversityVerified email at tamu.edu
- Xinmiao LinRochester Institute of TechnologyVerified email at rit.edu
- Zizheng LiuTencentVerified email at tencent.com
- Hanbin HongUniversity of ConnecticutVerified email at uconn.edu
- Yuan HongUniversity of ConnecticutVerified email at uconn.edu
- Xiwen DengxiongRochester Institute of TechnologyVerified email at g.rit.edu
- Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
- Yifan LiPhD of Michigan State UniversityVerified email at msu.edu
- Huan LiuRegents Professor, Arizona State UniversityVerified email at asu.edu
- Tianlong ChenIncoming Asst. Professor, CS@UNC Chapel Hill; PostDoc, CSAIL@MIT+BMI@Harvard; Ph.D., ECE@UT AustinVerified email at mit.edu