Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
41 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- jiajia liuProfessor, School of Cybersecurity, Northwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanEmail verificata su it.is.tohoku.ac.jp
- Yanning ZhangNorthwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Wen SunNorthwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Qingcai ChenProfessor, Harbin Institute of Technology (Shenzhen)Email verificata su hit.edu.cn
- Lei ZhaoUniversity of VictoriaEmail verificata su uvic.ca
- Huiling QinBeijing Normal UniversityEmail verificata su bnu.edu.cn
- Shangwei ZhangNorthwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Zubair Md FadlullahAssociate Professor, Department of Computer Science, Western UniversityEmail verificata su ieee.org
- Hiroki NishiyamaTohoku University, JAPANEmail verificata su ieee.org
- Qiang YuAssociate Professor of Computer Science and Technology, Xidian UniversityEmail verificata su mail.xidian.edu.cn
- Ju RenDepartment of Computer Science and Technology, Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Yonghui WuAssociate Professor, University of FloridaEmail verificata su ufl.edu
- Bomin MaoSchool of Cybersecurity, Northwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Jiadai WangNorthwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Jun Xu (徐军)AI as Services, Visa Inc.Email verificata su visa.com
- Abderrahim BenslimaneFull Professor of Computer Science, Avignon University, FranceEmail verificata su univ-avignon.fr
- Haibin ZhangSenior scientist, TNOEmail verificata su tno.nl