Get my own profile
Public access
View all97 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Chi ChengCentral China Normal UniversityVerified email at ccnu.edu.cn
Yangfan Liang(梁杨帆)Jiaxing UniversityVerified email at zjxu.edu.cn
cheng guoDalian University of TechnologyVerified email at dlut.edu.cn
Tao JiangHuazhong University of Science and TechnologyVerified email at ieee.org
Wei GuoUniversity of CagliariVerified email at unica.it
QI ZHONGAssistant Professor, City University of MacauVerified email at cityu.edu.moMohammad ShojafarAssociate Professor, University of Surrey, EU Marie Curie Alumni, ACM Distinguished SpeakerVerified email at surrey.ac.uk
long liGuilin University of Electronic TechnologyVerified email at guet.edu.cnWeizheng (Kalvin) WangHong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Chien-Ming ChenSMIEEE, Professor, Nanjing University of Information Science and TechnologyVerified email at nuist.edu.cn
Weizhi MengProfessor, Lancaster University, United KingdomVerified email at lancaster.ac.uk
Quanyu ZhaoJiangsu Univerisity of TechnologyVerified email at jsut.edu.cn
Tianlong GuProfessor, Jinan University,GuangzhouVerified email at jnu.edu.cnChingfang Hsu (许静芳)Central China Normal UniversityVerified email at mail.ccnu.edu.cn
Chin-Chen ChangChair Professor, Feng Chia University, TaiwanVerified email at o365.fcu.edu.tw
Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
Regius Professor Rahim Tafazolli, CB...Regius Professor of Electronic EngineeringVerified email at surrey.ac.uk
Tao XiangProfessor of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
SHAO Jun(邵俊)Professor, Zhejiang Gongshang UniversityVerified email at zjgsu.edu.cn
King Hang Wang, KevinHong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk