Crea il mio profilo
Accesso pubblico
Visualizza tutto24 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Rujia LiInstitute for Advanced Study, Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Prof. Shiping ChenCSIRO Data61, AustraliaEmail verificata su data61.csiro.au
- Yi LiuJinan UniversityEmail verificata su jnu.edu.cn
- David GalindoCTO, Valory AGEmail verificata su valory.xyz
- Cunsheng DingProfessor of Computer Science, HKUSTEmail verificata su cse.ust.hk
- Alexander PottOtto von Guericke University, Faculty of MathematicsEmail verificata su ovgu.de
- Jerod MichelNanjing University of Aeronautics and AstronauticsEmail verificata su nuaa.edu.cn
- Mark D. RyanProfessor of Computer Security, University of BirminghamEmail verificata su cs.bham.ac.uk
- Yue ZhouNational University of Defense TechnologyEmail verificata su nudt.edu.cn
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyEmail verificata su swin.edu.au
- Siu-Ming YiuProfessor of Computer Science, The University of Hong KongEmail verificata su cs.hku.hk
- Zhengchun ZhouSouthwest Jiaotong University (Professor)Email verificata su home.swjtu.edu.cn
- Thomas HardjonoMITEmail verificata su mit.edu
- Haode YanSouthwest Jiaotong UniversityEmail verificata su swjtu.edu.cn
- Shengcai LiuAgency for Science, Technology and ResearchEmail verificata su cfar.a-star.edu.sg
- Ning LuPhD HKUST & SUSTechEmail verificata su cse.ust.hk
- Maosheng XiongAssociate Professor of Mathematics, Hong Kong University of Science and TechnologyEmail verificata su ust.hk
- Pingzhi Fan (范平志)Southwest Jiaotong University (西南交通大学)Email verificata su swjtu.edu.cn
- Zhi GuSouthwest Jiaotong UniversityEmail verificata su my.swjtu.edu.cn
- Liusheng HuangProfessor of Computer Science, University of Science and Technology of ChinaEmail verificata su ustc.edu.cn