Crea il mio profilo
Accesso pubblico
Visualizza tutto64 articoli
83 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yong XiangSchool of Information Technology, Deakin UniversityEmail verificata su deakin.edu.au
- Wenying WenJiangxi University of Finance and EconomicsEmail verificata su jxufe.edu.cn
- chai xiuli(柴秀丽)School of Computer and Information Engineering,Henan UniversityEmail verificata su henu.edu.cn
- Leo Yu ZHANGSnr. Lecturer, School of ICT, Griffith UniversityEmail verificata su griffith.edu.au
- Junxin ChenProfessor, Dalian University of TechnologyEmail verificata su ieee.org
- Jiantao ZhouProfessor, Department of Computer and Information Science, University of MacauEmail verificata su umac.mo
- Rushi LanGuilin University of Electronic TechnologyEmail verificata su guet.edu.cn
- Yuming FangJiangxi University of Finance and EconomicsEmail verificata su ntu.edu.sg
- Youwen ZhuNanjing University of Aeronautics and AstronauticsEmail verificata su imi.kyushu-u.ac.jp
- Xiaochun CaoSun Yat-sen UniversityEmail verificata su mail.sysu.edu.cn
- Zhongyun HuaAssociate Professor, Harbin Institute of Technology, ShenzhenEmail verificata su hit.edu.cn
- Tao XiangProfessor of Computer Science, Chongqing UniversityEmail verificata su cqu.edu.cn
- Jian WengProfessor, College of Cyber Security, Jinan UniversityEmail verificata su jnu.edu.cn
- Zhihua XiaJinan UniversityEmail verificata su jnu.edu.cn
- Xinpeng Zhang (张新鹏)Professor, Shanghai University/Fudan UniversityEmail verificata su shu.edu.cn
Segui
Yushu Zhang (张玉书)
College of Computer Science, Nanjing University of Aeronautics and Astronautics
Email verificata su nuaa.edu.cn - Home page