Crea il mio profilo
Accesso pubblico
Visualizza tutto31 articoli
6 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xiapu LuoThe Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
- Le YuNanjing University of Posts and Telecommunications, School of Computer ScienceEmail verificata su polyu.edu.hk
- Yajin ZhouZhejiang UniversityEmail verificata su zju.edu.cn
- Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityEmail verificata su cse.tamu.edu
- Tao ZhangSchool of Computer Science and Engineering, Macau University of Science and TechnologyEmail verificata su must.edu.mo
- Zhou XUChongqing University & The Hong Kong Polytechnic UniversityEmail verificata su cqu.edu.cn
- Dinghao WuPennsylvania State UniversityEmail verificata su psu.edu
- Yuru ShaoPinterestEmail verificata su pinterest.com
- CHENXIONG QIANThe University of Hong KongEmail verificata su cs.hku.hk
- Ang ChenUniversity of MichiganEmail verificata su umich.edu
- Qiao KangRice UniversityEmail verificata su rice.edu
- Alvin T.S. ChanAssociate Professor, Singapore Institute of TechnologyEmail verificata su SingaporeTech.edu.sg
- TANG QIYIInformation Security Researcher, TencentEmail verificata su tencent.com
- Muhui JiangPh.D. The Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
- Ming Fan (范铭)Xi'an Jiaotong UniversityEmail verificata su mail.xjtu.edu.cn
- Guozi Sun (孙国梓)Professor, Nanjing University of Posts and TelecommunicationsEmail verificata su njupt.edu.cn
- Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyEmail verificata su sustech.edu.cn
- Man Ho AuProfessor, The Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
- Bo AnNanyang Technological UniversityEmail verificata su ntu.edu.sg
- cong shiSchool of Computer Science, Georgia Institute of TechnologyEmail verificata su gatech.edu