Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonEmail verificata su uoregon.edu
- Nan LiUniversity of WollongongEmail verificata su uow.edu.au
- Binanda SenguptaDepartment of Information Technology, IIEST ShibpurEmail verificata su it.iiests.ac.in
- Robert H. DengSingapore Management UniversityEmail verificata su smu.edu.sg
- Yi MuProfessorEmail verificata su cityu.mo
- Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityEmail verificata su smu.edu.sg
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg
- Yinghui ZhangXUPT & SMUEmail verificata su smu.edu.sg
- Zheng YANGSouthwest UniversityEmail verificata su swu.edu.cn
- Yong Yu(禹勇)Professor, Shaanxi Normal UniversityEmail verificata su snnu.edu.cn
- Paweł SzałachowskiEmail verificata su google.com
- Ximeng Liu (刘西蒙, Simon)Professor, Fuzhou UniversityEmail verificata su fzu.edu.cn
- Bing ChangResearch Fellow, Singapore Management UniversityEmail verificata su smu.edu.sg
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTEmail verificata su tudelft.nl
- Chunhua SuDivision of Computer Science, University of Aizu, JapanEmail verificata su u-aizu.ac.jp
- Atsuko MiyajiOsaka UniversityEmail verificata su comm.eng.osaka-u.ac.jp
- Hui CuiMonash UniversityEmail verificata su monash.edu
- Tsz Hon YuenMonash UniversityEmail verificata su monash.edu
- Liqun ChenProfessor, University of Surrey, UKEmail verificata su surrey.ac.uk
- Long MengPostDoctoral Research Fellow, University of SurreyEmail verificata su surrey.ac.uk