Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Robert H. DengSingapore Management UniversityEmail verificata su smu.edu.sg
- Feng BaoHuaweiEmail verificata su huawei.com
- Jian WengProfessor, College of Cyber Security, Jinan UniversityEmail verificata su jnu.edu.cn
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg
- Haibing LuSanta Clara UniversityEmail verificata su scu.edu
- Xuhua DingSingapore Management UniversityEmail verificata su smu.edu.sg
- zhuo weiShield Lab @ Singapore HuaweiEmail verificata su huawei.com
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Beng Chin OOINational University of SingaporeEmail verificata su comp.nus.edu.sg
- Yongdong WuEmail verificata su i2r.a-star.edu.sg
- Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaEmail verificata su zhejianglab.com
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonEmail verificata su uoregon.edu
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTEmail verificata su tudelft.nl