Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Xiangyu ZhangSamuel Conte Professor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Wei YouRenmin University of ChinaVerified email at ruc.edu.cn
Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityVerified email at purdue.edu
Shiqing MaUniversity of Massachusetts, AmherstVerified email at umass.edu
Yousra AaferPostdoctoral Researcher, Purdue UniversityVerified email at purdue.edu
Xusheng XiaoAssociate Professor, Arizona State UniversityVerified email at asu.edu
Zhenyu WuNEC Laboratories America Inc.Verified email at nec-labs.com
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Kangjie LuAssociate Professor, University of MinnesotaVerified email at umn.edu
Yanjun WuInstitute of Software, Chinese Academy of SciencesVerified email at iscas.ac.cn
Xueqiang WangUniversity of Central FloridaVerified email at ucf.edu
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
Feng QinThe Ohio State UniversityVerified email at cse.ohio-state.edu
Juan ZhaiUniversity of Massachusetts, AmherstVerified email at umass.edu
Guanhong TaoPh.D., Purdue UniversityVerified email at purdue.edu
Yan CaiState Key Laboratory of Computer Science, ISCAS, ChinaVerified email at ios.ac.cn
Daxiang DongBaiduVerified email at baidu.com
Bo XueStudent of Information security, Renmin University of ChinaVerified email at ruc.edu.cn
Yapeng YePurdue UniversityVerified email at purdue.edu
ZHUO ZHANGPostdoc, Purdue UniversityVerified email at purdue.edu
Follow![Jianjun Huang](/citations/images/avatar_scholar_128.png)
![Jianjun Huang](/citations/images/avatar_scholar_128.png)
Jianjun Huang
School of Information, Renmin University of China
Verified email at ruc.edu.cn - Homepage