Get my own profile
Public access
View all9 articles
24 articles
available
not available
Based on funding mandates
Co-authors
- Shaozi Li厦门大学智能科学与技术系教授Verified email at xmu.edu.cn
- Yaojin LinMinnan Normal UniversityVerified email at mnnu.edu.cn
- Jinyi LongCollege of Information Science and Technology, Jinan UniversityVerified email at jnu.edu.cn
- Jinghua LiuDepartment of Computer Science and Technology, Huaqiao University, Xiamen.Verified email at hqu.edu.cn
- Guodong DuDepartment of Artificial Intelligence, Xiamen UniversityVerified email at stu.xmu.edu.cn
- Hanrui WuVerified email at hku.hk
- Min JIANG 江敏Professor, Xiamen UniversityVerified email at xmu.edu.cn
- Professor Kay Chen TANChair Professor, Department of Computing, Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Xindong WuHefei University of TechnologyVerified email at hfut.edu.cn
- Qinghua HuProfessor of Computer Science, Tianjin UniversityVerified email at tju.edu.cn
- Hong-Bo ZhangSchool of Computer Science and technology, Huaqiao UniversityVerified email at hqu.edu.cn
- Zhi-An HuangCity University of Hong Kong (Dongguan)Verified email at cityu-dg.edu.cn
- Yong TangSouth China Normal University
Follow
Jia Zhang
College of Information Science and Technology, Jinan University
Verified email at jnu.edu.cn - Homepage