Crea il mio profilo
Accesso pubblico
Visualizza tutto76 articoli
81 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xiaofeng TaoBeijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROEmail verificata su csiro.au
- YANZHAO HOUBeijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Mikko ValkamaTampere University, FinlandEmail verificata su tuni.fi
- Xueqing HuangNew York Institute of TechnologyEmail verificata su nyit.edu
- Kwang-cheng ChenProfessor, Department of Electrical Engineering, University of South Florida; IEEE FellowEmail verificata su usf.edu
- Martin HaenggiFreimann Professor of Electrical Engineering and Prof. of Applied Math., University of Notre DameEmail verificata su nd.edu
- Riku JanttiAalto UniversityEmail verificata su aalto.fi
- Mulugeta K. FikaduTampere University of TechnologyEmail verificata su tut.fi
- Bing LuoAssistant Professor of Data and Computational Science, Duke Kunshan UniversityEmail verificata su duke.edu
- Xinlei YuBeijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Alexis DowhuszkoAalto UniversityEmail verificata su aalto.fi
- Prof. Y. Jay GuoUniversity of Technology Sydney, AustraliaEmail verificata su uts.edu.au
- Na LiBeijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
Segui
Qimei Cui
Professor , School of Information and Communication Engineering ,Beijing University of Posts and
Email verificata su bupt.edu.cn