Get my own profile
Public access
View all33 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Tao XiePeking University Chair Professor, Chair of Department of Software Science and Engineering@PKUVerified email at pku.edu.cn
Cong LiuUniversity of California Riverside, Associate ProfessorVerified email at ucr.edu
Simin ChenColumbia UniversityVerified email at utdallas.edu
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Hai JinHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Xusheng XiaoAssociate Professor, Arizona State UniversityVerified email at asu.edu
William EnckProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Mukul R PrasadAWS ScienceVerified email at amazon.com
Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
Deguang KongGoogleVerified email at google.com
Weihang WangUniversity of Southern CaliforniaVerified email at usc.edu
Adam BatesAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
ChengXiang ZhaiUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Dongmei ZhangMicrosoft ResearchVerified email at microsoft.com
Jian-Guang LOUMicrosoft Research AsiaVerified email at microsoft.com
Jian PengHelixonVerified email at helixon.com
Soteris DemetriouAssociate Professor, Imperial College LondonVerified email at imperial.ac.uk
Aston ZhangLlama team, MetaVerified email at meta.com
Pinjia HeAssistant Professor, The Chinese University of Hong Kong, ShenzhenVerified email at cuhk.edu.cn
Xiao YuResearch Manager, Machine Learning & Security, Stellar CyberVerified email at stellarcyber.ai
Follow
Wei Yang
Associate Professor, Department of Computer Science, University of Texas at Dallas
Verified email at utdallas.edu - Homepage