Get my own profile
Public access
View all40 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Li ZhengBeijing University of TechnologyVerified email at mail.sdu.edu.cn
- Willi MeierFHNWVerified email at fhnw.ch
- Siwei SunChinese Academy of SciencesVerified email at ucas.ac.cn
- Anubhab BaksiNanyang Technological University, SingaporeVerified email at e.ntu.edu.sg
- Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
- Zhiyu ZhangPHD candidate, Institute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
- Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
- Meiqin WangProfessor of Mathematics, Shandong UniversityVerified email at sdu.edu.cn
- Anyu WangInstitute for Advanced Study, Tsinghua University,Verified email at mail.tsinghua.edu.cn
- Gaoli WangEast China Normal University, professorVerified email at sei.ecnu.edu.cn
- Fei GaoProfessor of Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
- Yunwen LiuCryptographer