Crea il mio profilo
Accesso pubblico
Visualizza tutto25 articoli
40 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Abbas Jamalipour, Fellow IEEE, Fello...Professor of Ubiquitous Mobile Networking, The University of SydneyEmail verificata su ieee.org
- Lei GuoChongqing University of Posts and TelecommunicationsEmail verificata su cqupt.edu.cn
- Zhaolong Ning(宁兆龙)Professor, Highly Cited Researcher, Chongqing University of Posts and TelecommunicationsEmail verificata su ieee.org
- Shiqiang WangIBM T. J. Watson Research CenterEmail verificata su us.ibm.com
- Peng LinNanjing University of Information Science and Technology, ChinaEmail verificata su nuist.edu.cn
- Yang HuangNanjing University of Aeronautics and AstronauticsEmail verificata su nuaa.edu.cn
- Weigang HouNortheastern university, Shenyang, ChinaEmail verificata su cse.neu.edu.cn
- Xuetao WeiAssociate Professor, Southern University of Science and TechnologyEmail verificata su sustech.edu.cn
- Xiaoxue GongChongqing University of Posts and TelecommunicationsEmail verificata su cqupt.edu.cn
- Komal S. KhanCyber Defense Specialist, DarktraceEmail verificata su ieee.org
- Tie QiuTianjin UniversityEmail verificata su ieee.org
- Yue ZongNortheastern UniversityEmail verificata su stumail.neu.edu.cn
- Xiangjie Kong (孔祥杰)Professor of Computer Science, Zhejiang University of TechnologyEmail verificata su ieee.org