Get my own profile
Public access
View all20 articles
13 articles
available
not available
Based on funding mandates
Co-authors
Alex KotNanyang Technological UniversityVerified email at ntu.edu.sg
Shiqi Wang 王诗淇Assistant Professor, Department of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Renjie WanHong Kong Baptist UniversityVerified email at hkbu.edu.hk
Sinno Jialin PanThe Chinese University of Hong KongVerified email at cuhk.edu.hk
Leida LiSchool of Artificial Intelligence, Xidian University, ChinaVerified email at xidian.edu.cn
Dr. Anderson Rocha (Full Professor)University of Campinas (Unicamp), Campinas, SP, BrazilVerified email at unicamp.br
Chenqi KONGPhD student, Computer Science, City University of Hong KongVerified email at my.cityu.edu.hk
Wang YufeiNanyang Technological UniversityVerified email at ntu.edu.sg
Lap-Pui ChauThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Lingyu Duan 段凌宇Full Professor, The School of EE & CS, Peking UniversityVerified email at pku.edu.cn
Boxin ShiPeking UniversityVerified email at pku.edu.cn
Rizhao CaiNanyang Technological UniversityVerified email at ntu.edu.sg
Zhi LiNanyang Technological UniversityVerified email at ntu.edu.sg
Weisi LinProfessor, Nanyang Technological UnversityVerified email at ntu.edu.sg
Shan LinResearch Fellow, Nanyang Technological UniversityVerified email at ntu.edu.sg
Chang-Tsun LiProfessor of Cyber Security at Deakin University, AustraliaVerified email at deakin.edu.au
Kwok-Yan LamNanyang Technological UniversityVerified email at ntu.edu.sg
Sam KwongCity University of Hong KongVerified email at cityu.edu.hk
Tie-Qiang LiKarolinska InstituteVerified email at ki.se
Ah-Hwee TanSingapore Management UniversityVerified email at smu.edu.sg
Follow
Haoliang Li
Department of Electrical Engineering, City University of Hong Kong
Verified email at cityu.edu.hk - Homepage