Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
16 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jeng-Shyang Pan (潘正祥)Nanjing University of Information Science & Technology/Shandong University of Science and TechnologyEmail verificata su ieee.org
- Sisi ZlatanovaProfessor at UNSW, Built EnvironmentEmail verificata su unsw.edu.au
- Wenjie ZhangProfessor of Computer Science and Engineering, University of New South WalesEmail verificata su cse.unsw.edu.au
- Shu-Chuan ChuComputer Science and Engineering, Shandong University of Science and TechnologyEmail verificata su sdust.edu.cn
- Lijun ChangUniversity of SydneyEmail verificata su sydney.edu.au
- Jinjin YanAssociate Professor at Harbin Engineering UniversityEmail verificata su hrbeu.edu.cn
- Abdoulaye A. DiakitéGRID, Faculty of Built Environment, UNSW, SydneyEmail verificata su unsw.edu.au
- Mitko AleksandrovUniversity of MünsterEmail verificata su uni-muenster.de
- Chia-Chen LinProfessor of Computer Science and Information Engineering, National Chin-Yi University of TechnologyEmail verificata su ncut.edu.tw
- Lu QinUniversity of Technology, SydneyEmail verificata su uts.edu.au
- Hsiang-Cheh Huang (黃祥哲)National University of KaohsiungEmail verificata su nuk.edu.tw
- Tarek GaberSenior Lecturer in Cybersecurity, University of Salford, UK & Professor, Suez Canal University, EGEmail verificata su salford.ac.uk
- Xuemin LinChair Professor at Shanghai Jiaotong UniversityEmail verificata su cse.unsw.edu.au