Crea il mio profilo
Accesso pubblico
Visualizza tutto66 articoli
32 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonEmail verificata su iu.edu
- Guozhu MengAssociate Professor with Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Shengzhi ZhangBoston University MET CollegeEmail verificata su bu.edu
- Ruigang LiangInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Yue ZhaoUniversity of Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Yeonjoon LeeAssistant Professor of College of Computing, Hanyang UniversityEmail verificata su hanyang.ac.kr
- Nan ZhangFacebook Inc.Email verificata su indiana.edu
- Xuejing YuanSchool of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876Email verificata su bupt.edu.cn
- Haixu TangProfessor, Indiana UniversityEmail verificata su indiana.edu
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Yuxuan ChenShandong UniversityEmail verificata su sdu.edu.cn
- Yi ChenAssistant Professor, The University of Hong KongEmail verificata su hku.hk
- Peizhuo LvInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Jinwen HeInstitute of Information Engineering,Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Jin Li 李进Professor @Guangzhou UniversityEmail verificata su gzhu.edu.cn
- Peiyuan ZongInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Tongxin LiPeking UniversityEmail verificata su pku.edu.cn
- Yunhui LongUniversity of Illinois at Urbana-ChampaignEmail verificata su illinois.edu
- Xiaojing LiaoIndiana University BloomingtonEmail verificata su indiana.edu