Get my own profile
Public access
View all27 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Yu-Kun LaiProfessor, Cardiff UniversityVerified email at cs.cf.ac.uk
- Yong-Jin LIUComputer Science and Technology, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Ping TanHong Kong University of Science and Technology (HKUST)Verified email at ust.hk
- Yinda ZhangGoogle ResearchVerified email at google.com
- Fang LiuCommunication University of China; Tsinghua University; Chinese Academy of ChinaVerified email at cuc.edu.cn
- Jian ChengInstitute of Software, CASVerified email at iscas.ac.cn
- Baowen ZhangThe Hong Kong University of Science and TechnologyVerified email at connect.ust.hk
- Yihong WuNational Laboratory of Pattern Recognition, Institute of Automation Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
- Guozhen ZhaoAssociate Researcher, Institute of Psychology, Chinese Academy of SciencesVerified email at psych.ac.cn
- Zhaopeng CuiZhejiang UniversityVerified email at zju.edu.cn
- Dexin ZuoPhD student, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Lei HuInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
- Jian ShiChinese Academy of SciencesVerified email at ia.ac.cn
- Changqing ZOU (ZOU Changqing - 邹...Zhejiang UniversityVerified email at zju.edu.cn
- Yangang WangAssociate professor at Southeast UniversityVerified email at microsoft.com
- Stephen LinMicrosoft Research AsiaVerified email at microsoft.com
- Zeyuan HuangInstitute of Software, Chinese Academy of SciencesVerified email at iscas.ac.cn
- Xiaopeng ZHANGNational Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
- Shengfeng QinNorthumbria UniversityVerified email at Northumbria.ac.uk
- Wentian QuInstitute of Software Chinese Academy of SciencesVerified email at iscas.ac.cn