Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
10 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Cong WangDepartment of Computer Science, City University of Hong KongEmail verificata su cityu.edu.hk
- Qian WangIEEE Fellow, Professor, School of Cyber Science and Engineering, Wuhan UniversityEmail verificata su whu.edu.cn
- Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Yifeng ZhengHarbin Institute of TechnologyEmail verificata su hit.edu.cn
- Jian WengProfessor, College of Cyber Security, Jinan UniversityEmail verificata su jnu.edu.cn
- Shengshan HuSchool of CSE, Huazhong University of Science and Technology (HUST)Email verificata su hust.edu.cn
- Kui RenProfessor and Dean of Computer Science, Zhejiang University, ACM/IEEE FellowEmail verificata su zju.edu.cn
- Jiasi Weng (翁嘉思)Jinan University (Guangzhou)Email verificata su jnu.edu.cn
- Lei XuNanjing University of Science and TechnologyEmail verificata su njust.edu.cn
- Yuefeng DuResearcher, City University of Hong KongEmail verificata su cityu.edu.hk
- Yu GuoBeijing Normal UniversityEmail verificata su bnu.edu.cn