Get my own profile
Public access
View all32 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Guanrong ChenCity University of Hong KongVerified email at cityu.edu.hk
- K.T. LoAssociate Professor, Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
- Jinhu LuProfessor of Beihang UniversityVerified email at iss.ac.cn
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
- Gonzalo AlvarezCSICVerified email at iec.csic.es
- Dongdong Lin (林东东)Shenzhen UniversityVerified email at email.szu.edu.cn
- David Arroyo (ORCID: 0000-0001-889...CSIC (ROR 00zsy6110)Verified email at csic.es
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
- Qianxue WangGuangdong University of TechnologyVerified email at gdut.edu.cn
- Jürgen KurthsProfessor of Physics, Humboldt University BerlinVerified email at pik-potsdam.de
- Siwang Zhou (周四望)Hunan UniversityVerified email at hnu.edu.cn
- Lei ChenVerified email at bupt.edu.cn
- Xiaowei Li (李小伟)Professor, Sichuan University, Electronic & Information EngineeringVerified email at scu.edu.cn
- Xu QuanChangzhou UniversityVerified email at cczu.edu.cn
- Hongbo JiangHunan UniversityVerified email at hnu.edu.cn
- C.-C. Jay KuoMing Hsieh Chair Professor in ECE-Systems, University of Southern CaliforniaVerified email at sipi.usc.edu
- Der-Chyuan LouDepartment of Computer Science and Information Engineering, Chang Gung University, Taoyuan 33302Verified email at mail.cgu.edu.tw
- Bo Zhou(周博)College of Mathematics and Statistics, Chongqing Jiaotong UniversityVerified email at cqjtu.edu.cn