Get my own profile
Public access
View all4 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Jing Liu 刘静Professor in Institute of Automation of the Chinese Academy Sciences (CASIA)Verified email at nlpr.ia.ac.cn
Yong LiJD.COMVerified email at jd.com
Richang HongHefei University of TechnologyVerified email at hfut.edu.cn
Peisong WangCASIAVerified email at nlpr.ia.ac.cn
Qinghao HuInstitute of Automation, Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
Jian Cheng (程健)Professor, Institute of Automation, Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
Lixiang Li(李丽香)Professor in School of Cyberspace Security, Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Longteng GuoByteDance; Ph.D, Institute of Automation of the Chinese Academy Sciences (CASIA)Verified email at nlpr.ia.ac.cn
Jun FuBeijing, China