Get my own profile
Public access
View all68 articles
111 articles
available
not available
Based on funding mandates
Co-authors
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Wenying WenJiangxi University of Finance and EconomicsVerified email at jxufe.edu.cn
chai xiuli(柴秀丽)School of Computer and Information Engineering,Henan UniversityVerified email at henu.edu.cn
Leo Yu ZHANGSnr. Lecturer, School of ICT, Griffith UniversityVerified email at griffith.edu.au
Junxin ChenProfessor, Dalian University of TechnologyVerified email at ieee.org
Rushi LanGuilin University of Electronic TechnologyVerified email at guet.edu.cn
Zhongyun HuaProfessor, Harbin Institute of Technology, ShenzhenVerified email at hit.edu.cn
Jiantao ZhouProfessor, Department of Computer and Information Science, University of MacauVerified email at umac.mo
Yuming FangJiangxi University of Finance and EconomicsVerified email at ntu.edu.sg
Youwen ZhuNanjing University of Aeronautics and AstronauticsVerified email at imi.kyushu-u.ac.jp
Xiaochun CaoSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Tao XiangProfessor of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Zhihua XiaJinan UniversityVerified email at jnu.edu.cn
Xinpeng Zhang (张新鹏)Professor, Shanghai University/Fudan UniversityVerified email at shu.edu.cn