Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
40 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jian WengProfessor, College of Cyber Security, Jinan UniversityEmail verificata su jnu.edu.cn
- Guanggang GengJinan UniversityEmail verificata su jnu.edu.cn
- Xiaoping LiuEmail verificata su lakeheadu.ca
- Luo Xin (罗辛)Southwest UniversityEmail verificata su swu.edu.cn
- Xuefeng ZhouInstitute of Intelligent Manufacturing, Guangdong Academy of SciencesEmail verificata su giim.ac.cn
- Hongliang GuoInstitute for Infocomm Research (I2R), Agency for Science, Technology and ResearchEmail verificata su i2r.a-star.edu.sg
- Ameer Hamza KhanResearch Assistant Professor, The Hong Kong Polytechnic UniversityEmail verificata su polyu.edu.hk
- Seifedine Kadry, Fellow IETNoroff University CollegeEmail verificata su noroff.no
- Jie GuiSoutheast University, ChinaEmail verificata su ustc.edu
- Ameer Tamoor KhanPostdoc, University of CopenhagenEmail verificata su plen.ku.dk
- Jianxiao ZouProfessor of University of Electronic Science and Technology of ChinaEmail verificata su uestc.edu.cn
- Jilian ZhangJinan University, Guangzhou ChinaEmail verificata su smu.edu.sg
- Yonghua YinImperial College LondonEmail verificata su imperial.ac.uk
- Yongdong WuEmail verificata su i2r.a-star.edu.sg
- Ming-Sheng ShangChongqing Institute of Green and Intelligent Technology, Chinese Academy of SciencesEmail verificata su cigit.ac.cn