Get my own profile
Public access
View all19 articles
47 articles
available
not available
Based on funding mandates
Co-authors
- Anfeng LiuCentral South University, ChinaVerified email at mail.csu.edu.cn
- Guojun WangGuangzhou University, ChinaVerified email at gzhu.edu.cn
- Qin LiuAssociate Professor, Hunan University, ChinaVerified email at hnu.edu.cn
- Naixue Xiong, Neal Xiong, Neal N. Xio...Colorado Technical University, Northeastern State UniversityVerified email at nsuok.edu
- Md Zakirul Alam BhuiyanComp. & Info. Sciences, Fordham University (Highly-Cited Researcher, The Rising Star of Science)Verified email at fordham.edu
- Houbing Herbert SongIEEE Fellow, ACM DM, WoS Highly Cited Researcher, University of Maryland, Baltimore CountyVerified email at umbc.edu
- Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
- Xiong LiUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Jemal AbawajyFull Professor, Deakin University, AustraliaVerified email at deakin.edu.au
- Kenli LiCheung Kong Professor, Hunan UniversityVerified email at hnu.edu.cn
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu