Crea il mio profilo
Accesso pubblico
Visualizza tutto51 articoli
12 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityEmail verificata su rmit.edu.au
- Dusit (Tao) NiyatoNanyang Technological University (NTU)Email verificata su ntu.edu.sg
- Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeEmail verificata su ntu.edu.sg
- Chi-Hung ChiCSIROEmail verificata su csiro.au
- Mengmeng YangData61, CSIRO, AustraliaEmail verificata su data61.csiro.au
- Yang ZhaoAgency for Science, Technology and Research (A*STAR)Email verificata su simtech.a-star.edu.sg
- Muhammad Baqer MollahECE @ UMass DartmouthEmail verificata su umassd.edu
- Xiuhua LiProfessor, School of Big Data & Software Engineering, Chongqing UniversityEmail verificata su cqu.edu.cn
- Huaxiong WangNanyang Technological University, SingaporeEmail verificata su ntu.edu.sg
- Andreas BurgEPFL - Telecommunications Circuits LaboratoryEmail verificata su epfl.ch
- Xiaohu You东南大学信息通信教授Email verificata su seu.edu.cn
- Siu-Ming YiuProfessor of Computer Science, The University of Hong KongEmail verificata su cs.hku.hk