Crea il mio profilo
Accesso pubblico
Visualizza tutto64 articoli
31 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonEmail verificata su iu.edu
Shengzhi ZhangBoston University MET CollegeEmail verificata su bu.edu
Ruigang LiangInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
Guozhu MengAssociate Professor with Chinese Academy of SciencesEmail verificata su iie.ac.cn
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
Yue ZhaoUniversity of Chinese Academy of SciencesEmail verificata su iie.ac.cn
Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityEmail verificata su hanyang.ac.kr
Nan ZhangFacebook Inc.Email verificata su indiana.edu
Haixu TangProfessor, Indiana UniversityEmail verificata su indiana.edu
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
Yuxuan ChenShandong UniversityEmail verificata su sdu.edu.cn
Xuejing YuanSchool of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876Email verificata su bupt.edu.cn
Yi ChenIndiana University BloomingtonEmail verificata su iu.edu
Jin Li 李进Professor @Guangzhou UniversityEmail verificata su gzhu.edu.cn
Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
Tongxin LiPeking UniversityEmail verificata su pku.edu.cn
Jinwen HeInstitute of Information Engineering,Chinese Academy of SciencesEmail verificata su iie.ac.cn
Peizhuo LvInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
Yunhui LongUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
Xiaojing LiaoIndiana University BloomingtonEmail verificata su indiana.edu