Crea il mio profilo
Accesso pubblico
Visualizza tutto67 articoli
60 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yu Wang (王昱)Professor of Computer and Information Sciences, FIEEE, DMACM, Temple UniversityEmail verificata su temple.edu
- Kashif SharifBeijing Institute of Technology, ChinaEmail verificata su bit.edu.cn
- Huijie Chen (陈慧杰)Department of Computer Science, Beijing University of TechnologyEmail verificata su bjut.edu.cn
- Boubakr NourCybersecurity Researcher, Ericsson, Montreal, CanadaEmail verificata su ericsson.com
- liehuang zhuBeijing Institute of TechnologyEmail verificata su bit.edu.cn
- Yang LiuProfessor of Beijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Meng ShenBeijing Institute of TechnologyEmail verificata su bit.edu.cn
- Xin LiBeijing Institute of TechnologyEmail verificata su bit.edu.cn
- TING LIAssistant Professor in Computer Science, Oxford College of Emory UniversityEmail verificata su emory.edu
- Siyuan ChenEmail verificata su uncc.edu
- Ke XUComputer Science Department, Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Mingzhong WangUniversity of the Sunshine CoastEmail verificata su usc.edu.au
- Bin XuProfessof of Computer Science and Technology, Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Xinghua (Mindy) ShiTemple UniversityEmail verificata su temple.edu
- Lijuan CaoUniversity of North Carolina CharlotteEmail verificata su uncc.edu
- Cheng BoGoogleEmail verificata su google.com
- Xufei MaoTsinghua UniversityEmail verificata su mail.tsinghua.edu.cn
- Yu ChengElectrical and Computer Engineering, Illinois Institute of TechnologyEmail verificata su iit.edu
- JIMING CHENProfessor at Zhejiang UniversityEmail verificata su ieee.org
- Xiumei FanXi'an University of TechnologyEmail verificata su xaut.edu.cn
Segui
Fan Li (李凡)
Professor of School of Computer Science, Beijing Institute of Technology
Email verificata su bit.edu.cn - Home page