Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Robert H. DengSingapore Management UniversityEmail verificata su smu.edu.sg
- Yongdong WuEmail verificata su i2r.a-star.edu.sg
- Jian WengProfessor, College of Cyber Security, Jinan UniversityEmail verificata su jnu.edu.cn
- Xuhua DingSingapore Management UniversityEmail verificata su smu.edu.sg
- Haibing LuSanta Clara UniversityEmail verificata su scu.edu
- Fuqiang GuCollege of Computer Science, Chongqing UniversityEmail verificata su cqu.edu.cn
- Kourosh KhoshelhamUniversity of MelbourneEmail verificata su unimelb.edu.au
- Dengpan YeWuhan UniversityEmail verificata su whu.edu.cn
- Jialie ShenCity, University of London, UKEmail verificata su city.ac.uk
- Binbin ChenSingapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Yu ChenProfessor, School of Cyber Science and Technology, Shandong UniversityEmail verificata su sdu.edu.cn
- zhao zhuyannokiaEmail verificata su vip.sina.com
- Baodong Qin (秦宝东)Xi'an University of Posts and Telecommunications
- Soonhung HanProfessor of Ocean Systems Engineering, KAISTEmail verificata su kaist.ac.kr
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioEmail verificata su utsa.edu