Get my own profile
Public access
View all2 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Kaiyu WanXi'an Jiaotong Liverpool UniversityVerified email at xjtlu.edu.cn
- Yong YueXi'an Jiaotong-liverpool UniversityVerified email at xjtlu.edu.cn
- Xin HuangTaiyuan University of TechnologyVerified email at huangstudio.org
- Romina SpalazzeseAssoc. Prof. in Computer Science at Malmö UniversityVerified email at mau.se
- Bahtijar VogelAssociate Professor, Computer Science, Malmö UniversityVerified email at mau.se
- Paul DavidssonProfessor of Computer Science, Malmö University, SwedenVerified email at mau.se
- Blerim EmruliSenior lecturer, Department of Informatics, Lund UniversityVerified email at ics.lu.se
- Jie ZhangXi'an Jiaotong-Liverpool UniversityVerified email at xjtlu.edu.cn
- Victor R. KebandeAsst Professor of Cyber & IT Security, Blekinge Institute of Technology, SwedenVerified email at bth.se
- Carl Magnus OlssonAssociate Professor of Computer Science, Malmö UniversityVerified email at mau.se
- SADI ALAWADIAssociated Professor of Machine Learning at Blekinge Tekniska Högskola (BTH), SwedenVerified email at bth.se
- Jan A. PerssonMalmö HögskolaVerified email at mau.se
- Joseph BugejaPostdoc in Computer Science at Malmö UniversityVerified email at mau.se