Crea il mio profilo
Accesso pubblico
Visualizza tutto136 articoli
50 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xiaojing HuangProfessor of ICT, University of Technology SydneyEmail verificata su uts.edu.au
- Pei-Yuan QinUniversity of Technology, SydneyEmail verificata su uts.edu.au
- J. Andrew ZhangProf, University of Technology SydneyEmail verificata su uts.edu.au
- Shu-Lin ChenUniversity of Technology SydneyEmail verificata su uts.edu.au
- Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROEmail verificata su csiro.au
- Richard W. ZiolkowskiProfessor Emeritus, University of ArizonaEmail verificata su arizona.edu
- He ZhuCommonwealth Scientific and Industrial Research Organisation (CSIRO)Email verificata su csiro.au
- Kai WuLecturer, GBDTC, SEDE, FEIT, UTSEmail verificata su uts.edu.au
- Jia DuCSIROEmail verificata su csiro.au
- Trevor S. BirdAntengenuityEmail verificata su ieee.org
- Hai-Han SunAssistant Professor, University of Wisconsin-MadisonEmail verificata su wisc.edu
- Jose Luis Gomez TorneroTechnical University of CartagenaEmail verificata su upct.es
- Debabrata Kumar KarmokarUniversity of South AustraliaEmail verificata su ieee.org
- Val DyadyukCSIROEmail verificata su csiro.au
- Xu WangSchool of Electrical and Data Engineering, University of Technology SydneyEmail verificata su uts.edu.au
- Robert HeathCharles Lee Powell Chair in Wireless Communication, University of California, San DiegoEmail verificata su ucsd.edu
- Maral AnsariResearch Engineer, CSIROEmail verificata su csiro.au
- John BuntonCSIROEmail verificata su csiro.au
- Jinhong YuanProfessor of Electrical Engineering and Telecommunications, University of New South WalesEmail verificata su unsw.edu.au
- Anh Tuyen LeUniversity of Technology SydneyEmail verificata su uts.edu.au
Segui
Prof. Y. Jay Guo
University of Technology Sydney, Australia
Email verificata su uts.edu.au - Home page