Get my own profile
Public access
View all2 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Jianping WangFellow of IEEE, Fellow of AAIA, Professor, City University of Hong KongVerified email at cityu.edu.hk
- Xinyu WangCity University of Hong KongVerified email at my.cityu.edu.hk
- Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityVerified email at monash.edu
- Marie-Jose MontpetitMITVerified email at mit.edu
- Cong WangDepartment of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
- Yi Wang (汪漪)Southern University of Science and Technology, Peng Cheng LaboratoryVerified email at ieee.org
- Weigang HouNortheastern university, Shenyang, ChinaVerified email at cse.neu.edu.cn
- Kejie LuUniversity of Puerto Rico at MayaguezVerified email at upr.edu
- Cedric WestphalAdjunct Associate Professor, UCSC; Principal Research Architect, FutureweiVerified email at soe.ucsc.edu
- Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongVerified email at gapps.cityu.edu.hk
- Hermine HovhannisyanCity University of Hong KongVerified email at my.cityu.edu.hk
- Bin ZhaoPh.D. Student @ Rice ECEVerified email at rice.edu
- Yingying ChengPostdoctoral Fellow, City University of Hong KongVerified email at cityu.edu.hk
- Xiangrong WangShenzhen UniversityVerified email at szu.edu.cn
- Bingyi LiuProfessor, Department of CS and AI, Wuhan University of Technology
- Jianer ZhouResearch Associate Professor, Southern University of Science and Technology, Shenzhen China.Verified email at sustech.edu.cn
- Jingpu DuanPeng Cheng Laboratory, Shenzhen, ChinaVerified email at pcl.ac.cn
Follow
Jinfan Wang
Research Associate Professor, Southern University of Science and Technology, China
Verified email at sustech.edu.cn