Crea il mio profilo
Accesso pubblico
Visualizza tutto40 articoli
10 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yike GuoDept of CSE, The Hong Kong University of Science and TechnologyEmail verificata su ust.hk
- Hao DongPeking UniversityEmail verificata su pku.edu.cn
- Fei WuProfessor of Computer Science, Zhejiang UniversityEmail verificata su cs.zju.edu.cn
- Kun KuangZhejiang UniversityEmail verificata su zju.edu.cn
- Jun XIAOInstitute of Artificial Intelligence, Zhejiang UniversityEmail verificata su zju.edu.cn
- Akara Supratak, PhDAssistant Professor of Computer Science, Mahidol UniversityEmail verificata su mahidol.edu
- Fengda ZhangZhejiang University, Nanyang Technological UniversityEmail verificata su zju.edu.cn
- Jie ZhangETH Zurich, Institute of Information SecurityEmail verificata su inf.ethz.ch
- Tao ShenZhejiang UniversityEmail verificata su zju.edu.cn
- Simon HuAssistant Professor at Zhejiang UnviersityEmail verificata su zju.edu.cn
- PRN ChildsImperial College LondonEmail verificata su imperial.ac.uk
- Moustafa GhanemProfessor, Middlesex University London, Visiting Imperial College London, Nile University CairoEmail verificata su imperial.ac.uk
- Li GuoSenior Lecturer in Computing, Manchester Metropolitan UniversityEmail verificata su mmu.ac.uk
- Xin XiaDirector of the Software Engineering Application Technology Lab, Huawei Technologies, ChinaEmail verificata su acm.org
- Dilshan SilvaPost Doc, Imperial College LondonEmail verificata su imperial.ac.uk
- Orestis TsinalisImperial College LondonEmail verificata su imperial.ac.uk
- Zhen WeiPhD, Imperial College LondonEmail verificata su ic.ac.uk
- Paul M. MatthewsEdmond and Lily Safra Chair, Professor of Clinical Neurosciences, Imperial College LondonEmail verificata su imperial.ac.uk
- Liuqing ChenZhejiang UniversityEmail verificata su zju.edu.cn
- Binbing LiaoZhejiang UniversityEmail verificata su zju.edu.cn