Crea il mio profilo
Accesso pubblico
Visualizza tutto65 articoli
26 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonEmail verificata su indiana.edu
- Shengzhi ZhangBoston University MET CollegeEmail verificata su bu.edu
- Ruigang LiangInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Guozhu MengAssociate Professor with Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Yue ZhaoUniversity of Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Nan ZhangFacebook Inc.Email verificata su indiana.edu
- Haixu TangProfessor, Indiana UniversityEmail verificata su indiana.edu
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityEmail verificata su hanyang.ac.kr
- Yuxuan ChenShandong UniversityEmail verificata su sdu.edu.cn
- Xuejing YuanSchool of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876Email verificata su bupt.edu.cn
- Yi ChenIndiana University BloomingtonEmail verificata su iu.edu
- Jin Li 李进Professor @Guangzhou UniversityEmail verificata su gzhu.edu.cn
- Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Tongxin LiPeking UniversityEmail verificata su pku.edu.cn
- Yunhui LongUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Xiaojing LiaoIndiana University BloomingtonEmail verificata su indiana.edu
- Luyi XingAssociate Professor of Computer Science, Indiana University BloomingtonEmail verificata su indiana.edu
- Peizhuo LvInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn