Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
172 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanEmail verificata su it.is.tohoku.ac.jp
- Hongzhi GuoNorthwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Hiroki NishiyamaTohoku University, JAPANEmail verificata su ieee.org
- Wen SunNorthwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Lei ZhaoUniversity of VictoriaEmail verificata su uvic.ca
- Zubair Md FadlullahAssociate Professor, Department of Computer Science, Western UniversityEmail verificata su ieee.org
- fengxiao tangtohoku university, central south universityEmail verificata su it.is.tohoku.ac.jp
- Yuichi KawamotoTohoku UniversityEmail verificata su ieee.org
- Tiago Koketsu RodriguesTohoku UniversityEmail verificata su it.is.tohoku.ac.jp
- Kaikai ChiZhejiang University of TechnologyEmail verificata su zjut.edu.cn
- Juntao GaoNara Institute of Science and TechnologyEmail verificata su is.naist.jp
- Yuanyuan Qiao (乔媛媛)Professor, BUPTEmail verificata su bupt.edu.cn
- Ai-Chun PangNational Taiwan UniversityEmail verificata su csie.ntu.edu.tw
- Yin Chen 陳 寅Graduate School of Media and Governance, Keio University, JapanEmail verificata su keio.jp
- Osamu AkashiNational Institute of InformaticsEmail verificata su nii.ac.jp
- Zhong-Yuan Jiang (蒋忠元)School of Cyber Engineering, Xidian University, Xi'an, Shaanxi 710071, ChinaEmail verificata su bjtu.edu.cn
- Jianping PanUniversity of VictoriaEmail verificata su uvic.ca
- Xuemin (Sherman) ShenUniversity Professor, University of WaterlooEmail verificata su uwaterloo.ca
Segui
jiajia liu
Professor, School of Cybersecurity, Northwestern Polytechnical University
Email verificata su nwpu.edu.cn