Get my own profile
Public access
View all21 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Ping TanSimon Fraser UniversityVerified email at sfu.ca
Yu-Kun LaiProfessor, Cardiff UniversityVerified email at cs.cf.ac.uk
Yinda ZhangGoogle ResearchVerified email at google.com
Yong-Jin LIUComputer Science and Technology, Tsinghua UniversityVerified email at tsinghua.edu.cn
Yihong WuNational Laboratory of Pattern Recognition, Institute of Automation Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
Fang Liutsinghua.edu.cn; mails.ucas.ac.cn; mails.ucas.edu.cnVerified email at tsinghua.edu.cn
Guozhen ZhaoAssociate Professor, Institute of Psychology, Chinese Academy of SciencesVerified email at psych.ac.cn
Zihao ZhangInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Lei HuInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Stephen LinMicrosoft Research AsiaVerified email at microsoft.com
Baowen ZhangInstitute of Software, Chinese Academy of SciencesVerified email at mails.ucas.ac.cn
Zhaopeng CuiZhejiang UniversityVerified email at zju.edu.cn
Changqing ZOU (ZOU Changqing - 邹...Zhejiang UniversityVerified email at zju.edu.cn
Jian ShiChinese Academy of SciencesVerified email at ia.ac.cn
Xiaopeng ZHANGNational Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
Yangang WangAssociate professor at Southeast UniversityVerified email at microsoft.com
Jian ChengInstitute of Software, CASVerified email at iscas.ac.cn
ke LuUniversity of Chinese Academy of sciencesVerified email at ucas.ac.cn
Yanguang WanPostgraduate student, Institute of Software, CASVerified email at mails.ucas.edu.cn
Wentian QuInstitute of Software Chinese Academy of SciencesVerified email at iscas.ac.cn