Get my own profile
Public access
View all7 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Yaxuan QiYunshan Networks Inc.Verified email at yunshan.net.cn
Zhi LiuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Zhe FuAlibaba DAMO AcademyVerified email at alibaba-inc.com
Zhen ChenTsinghua UniversityVerified email at tsinghua.edu.cn
Edwin HouProfessor, Department of Electrical and Computer Engineering, New Jersey Institute of TechnologyVerified email at njit.edu
Weirong JiangByteDanceVerified email at bytedance.com
Xiaohe HuTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Lianghong XuCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Xinming ChenUniversity of Massachusetts AmherstVerified email at google.com
Viktor K. PrasannaUniversity of Southern CaliforniaVerified email at usc.edu
Jiaxing Shang (尚家兴)Professor, College of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
Feng XiePhD Candidate in Tsinghua UniversityVerified email at mails.tsinghua.edu.cn
Ravindra NuggehalliProfessor, Department of Physics, New Jersey Institute of TechnologyVerified email at njit.edu
Scott ShenkerProfessor of Computer Science, UC BerkeleyVerified email at icsi.berkeley.edu
Zongwei ZhouSoftware Engineer at Google (Ph.D. from Carnegie Mellon University)Verified email at andrew.cmu.edu
Kai ZhengDirector, Computer Network & Protocol Research Lab, Huawei TechnologiesVerified email at tsinghua.org.cn
Mohammad Hashem HaghighatPhD Student of Network Security, Tsinghua UniversityVerified email at mails.tsinghua.edu.cn
Jiaqi GaoAlibaba GroupVerified email at alibaba-inc.com
Junda LiuUC Berkeley, ICSI, Google Inc.Verified email at google.com
Yiyang ShaoHuaweiVerified email at huawei.com