Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
6 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanEmail verificata su it.is.tohoku.ac.jp
- fengxiao tangtohoku university, central south universityEmail verificata su it.is.tohoku.ac.jp
- Zubair Md FadlullahAssociate Professor, Department of Computer Science, Western UniversityEmail verificata su ieee.org
- jiajia liuProfessor, School of Cybersecurity, Northwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Takeru InoueNTT Network Innovation Labs.Email verificata su ieee.org
- Osamu AkashiNational Institute of InformaticsEmail verificata su nii.ac.jp
- Kimihiro MizutaniKindai UniversityEmail verificata su info.kindai.ac.jp
- Yuichi KawamotoTohoku UniversityEmail verificata su ieee.org
- Yishi ZhuTohoku UniversityEmail verificata su it.is.tohoku.ac.jp
- Fumie OnoNational Institute of Information and Communications Technology, JAPANEmail verificata su nict.go.jp
- Jiadai WangNorthwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
Segui
Bomin Mao
School of Cybersecurity, Northwestern Polytechnical University
Email verificata su nwpu.edu.cn