Get my own profile
Public access
View all20 articles
14 articles
available
not available
Based on funding mandates
Co-authors
Alex KotNanyang Technological UniversityVerified email at ntu.edu.sg
Shiqi Wang 王诗淇Assistant Professor, Department of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Renjie WanHong Kong Baptist UniversityVerified email at hkbu.edu.hk
Sinno Jialin PanThe Chinese University of Hong KongVerified email at cuhk.edu.hk
Dr. Anderson Rocha (Full-Professor)University of Campinas (Unicamp), Campinas, SP, BrazilVerified email at unicamp.br
Leida LiSchool of Artificial Intelligence, Xidian University, ChinaVerified email at xidian.edu.cn
Chenqi KONGPhD student, Computer Science, City University of Hong KongVerified email at my.cityu.edu.hk
Wang YufeiNanyang Technological UniversityVerified email at ntu.edu.sg
Lap-Pui ChauThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Rizhao CaiNanyang Technological UniversityVerified email at ntu.edu.sg
Lingyu Duan 段凌宇Full Professor, The School of EE & CS, Peking UniversityVerified email at pku.edu.cn
Boxin ShiPeking UniversityVerified email at pku.edu.cn
Zhi LiNanyang Technological UniversityVerified email at ntu.edu.sg
Weisi LinProfessor, Nanyang Technological UnversityVerified email at ntu.edu.sg
Shan LinResearch Fellow, Nanyang Technological UniversityVerified email at ntu.edu.sg
Chang-Tsun LiProfessor of Cyber Security at Deakin University, AustraliaVerified email at deakin.edu.au
Sam KwongCity University of Hong KongVerified email at cityu.edu.hk
Kwok-Yan LamNanyang Technological UniversityVerified email at ntu.edu.sg
Tie-Qiang LiKarolinska InstituteVerified email at ki.se
Yang WenhanPeng Cheng LaboratoryVerified email at pcl.ac.cn
Follow
Haoliang Li
Department of Electrical Engineering, City University of Hong Kong
Verified email at cityu.edu.hk - Homepage