Crea il mio profilo
Accesso pubblico
Visualizza tutto32 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Guanrong ChenCity University of Hong KongEmail verificata su cityu.edu.hk
- K.T. LoAssociate Professor, Hong Kong Polytechnic UniversityEmail verificata su polyu.edu.hk
- Jinhu LuProfessor of Beihang UniversityEmail verificata su iss.ac.cn
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentEmail verificata su kent.ac.uk
- Gonzalo AlvarezCSICEmail verificata su iec.csic.es
- Dongdong Lin (林东东)Shenzhen UniversityEmail verificata su email.szu.edu.cn
- David Arroyo (ORCID: 0000-0001-889...CSIC (ROR 00zsy6110)Email verificata su csic.es
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickEmail verificata su warwick.ac.uk
- Qianxue WangGuangdong University of TechnologyEmail verificata su gdut.edu.cn
- Jürgen KurthsProfessor of Physics, Humboldt University BerlinEmail verificata su pik-potsdam.de
- Siwang Zhou (周四望)Hunan UniversityEmail verificata su hnu.edu.cn
- Lei ChenEmail verificata su bupt.edu.cn
- Xiaowei Li (李小伟)Professor, Sichuan University, Electronic & Information EngineeringEmail verificata su scu.edu.cn
- Xu QuanChangzhou UniversityEmail verificata su cczu.edu.cn
- Hongbo JiangHunan UniversityEmail verificata su hnu.edu.cn
- C.-C. Jay KuoMing Hsieh Chair Professor in ECE-Systems, University of Southern CaliforniaEmail verificata su sipi.usc.edu
- Der-Chyuan LouDepartment of Computer Science and Information Engineering, Chang Gung University, Taoyuan 33302Email verificata su mail.cgu.edu.tw
- Bo Zhou(周博)College of Mathematics and Statistics, Chongqing Jiaotong UniversityEmail verificata su cqjtu.edu.cn