Crea il mio profilo
Accesso pubblico
Visualizza tutto47 articoli
88 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ying WangInstitute of Computing Technology, Chinese Academy of SciencesEmail verificata su ict.ac.cn
- Xiaowei Li (李晓维)Institute of Computing Technology, Chinese Academy of SciencesEmail verificata su ict.ac.cn
- Yu Hu (胡 瑜)Institute of Computing Technology, Chinese Academy of SciencesEmail verificata su ict.ac.cn
- Lei ZhangICT, CAS & JeejioEmail verificata su ict.ac.cn
- Shengwen LiangInstitute of computing technology, Chinese Academy of SciencesEmail verificata su ict.ac.cn
- Gang QuUniversity of MarylandEmail verificata su umd.edu
- ying zhangtongji universityEmail verificata su tongji.edu.cn
- Yuntan FangHuaweiEmail verificata su huawei.com
- Kwang-Ting (Tim) ChengChair Professor of ECE and CSE, HKUSTEmail verificata su ust.hk
- Yongjun Xu (徐勇军)Institute of Computing Technology, CASEmail verificata su ict.ac.cn
- yuan caoHohai UniversityEmail verificata su e.ntu.edu.sg
- Long ChengProfessor, North China Electric Power UniversityEmail verificata su ncepu.edu.cn
- Shuai ChenJiangxi Science & Technology Normal UniversityEmail verificata su utah.edu
- Xiaoqing WenKyushu Institute of TechnologyEmail verificata su cse.kyutech.ac.jp
- Krishnendu ChakrabartyFulton Professor of Microelectronics, School of Electrical and Computer and Energy EngineeringEmail verificata su asu.edu
- Yuanqing ChengAssistant Professor of Electrical Engineering, Beihang UniversityEmail verificata su ieee.org
- Guihai YanAssociate Professor of Computer Science, Institute of Computing Technology, CASEmail verificata su ict.ac.cn
- Junfeng FanOpen Security ResearchEmail verificata su opsefy.com
- Zebo PengProfessor of Computer Systems, Linkoping UniversityEmail verificata su liu.se
- Jin SongAssistant Professor of Computer Science, North China Electric Power University, P. R. CinaEmail verificata su ncepu.edu.cn