Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
20 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Tiejun LvSchool of Elec. Engeering, Beijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROEmail verificata su csiro.au
- Zhipeng LinNanjing University of Aeronautics and AstronauticsEmail verificata su ieee.org
- Prof. Y. Jay GuoUniversity of Technology Sydney, AustraliaEmail verificata su uts.edu.au
- Xiaojing HuangProfessor of ICT, University of Technology SydneyEmail verificata su uts.edu.au
- Mehran AbolhasanProfessor, University of Technology SydneyEmail verificata su uts.edu.au
- Gordon SuttonUniversity of Technology SydneyEmail verificata su uts.edu.au
- Diep N. NguyenUniversity of Technology SydneyEmail verificata su uts.edu.au
- P. Takis MathiopoulosNational and Kapodistrian University of AthensEmail verificata su di.uoa.gr
- Hui GaoBeijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Yi ZhongBeijing Institute of TechnologyEmail verificata su bit.edu.cn
- J. Andrew ZhangProf, University of Technology SydneyEmail verificata su uts.edu.au
- Gaofeng PanThe School of Cyberspace Science and Technology, Beijing Institute of TechnologyEmail verificata su ieee.org
- Chau YuenIEEE Fellow, Highly Cited Researcher, Nanyang Technological UniversityEmail verificata su ntu.edu.sg
- Yi XuAmazon.comEmail verificata su amazon.com
- Norman BeaulieuThousand Talents Professor Beijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Fangqing TanGuilin University of Electronic TechnologyEmail verificata su guet.edu.cn