Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Quanquan GuAssociate Professor of Computer Science, UCLAVerified email at cs.ucla.edu
- Lu LinAssistant Professor of Information Science and Technology, Penn State UniversityVerified email at psu.edu
- Dongruo ZhouIndiana University BloomingtonVerified email at iu.edu
- Yuan CaoThe University of Hong KongVerified email at hku.hk
- Pan XuDuke UniversityVerified email at duke.edu
- Ting WangStony Brook UniversityVerified email at cs.stonybrook.edu
- Fenglong MaPennsylvania State UniversityVerified email at psu.edu
- Difan ZouThe University of Hong KongVerified email at cs.hku.hk
- Lingxiao WangToyota Technological Institute at ChicagoVerified email at ttic.edu
- Saket SatheSenior Applied Scientist, AmazonVerified email at amazon.com
- Charu AggarwalDistinguished Research Staff Member, IBM T. J. Watson Research CenterVerified email at us.ibm.com
- Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
- Xiao ZhangCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Jinfeng Yi (易津锋)Verified email at jd.com
- Bo LiUniversity of Illinois at Urbana–ChampaignVerified email at illinois.edu
- Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
- Amulya YadavAssistant Professor, Penn StateVerified email at psu.edu
- Jian MaRay and Stephanie Lane Professor of Computational Biology, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- David EvansUniversity of Virginia, Computer ScienceVerified email at virginia.edu
- Bodo RosenhahnL3S Research Center / Leibniz Universität HannoverVerified email at tnt.uni-hannover.de
Follow
Jinghui Chen
Assistant Professor of Information Sciences and Technology, Penn State University
Verified email at psu.edu - Homepage