Crea il mio profilo
Accesso pubblico
Visualizza tutto32 articoli
38 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Fan Li (李凡)Professor of School of Computer Science, Beijing Institute of TechnologyEmail verificata su bit.edu.cn
- liehuang zhuBeijing Institute of TechnologyEmail verificata su bit.edu.cn
- Chang XUAssociate Professor, Beijing Institute of Technology, Beijing, ChinaEmail verificata su bit.edu.cn
- Yu Wang (王昱)Professor of Computer and Information Sciences, FIEEE, DMACM, Temple UniversityEmail verificata su temple.edu
- Sujit Biswas, PhDLecturer (Asst. Prof.), City, University of London, UK; Research Associate, UCL, UKEmail verificata su city.ac.uk
- Boubakr NourCybersecurity Researcher, Ericsson, Montreal, CanadaEmail verificata su ericsson.com
- Zohaib LatifAssistant Professor, Nazarbayev University, KazakhstanEmail verificata su bit.edu.cn
- Saraju P. MohantyProfessor, University of North TexasEmail verificata su unt.edu
- Meng ShenBeijing Institute of TechnologyEmail verificata su bit.edu.cn