Get my own profile
Public access
View all9 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Zhipeng CaiProfessor, IEEE Fellow, Department of Computer Science, Georgia State UniversityVerified email at cs.gsu.edu
- Wei (Lisa) LiAssistant Professor, Department of Computer Science, Georgia State UniversityVerified email at gsu.edu
- Zuobin XiongAssistant Professor, Dept. of Computer Science, University of Nevada, Las VegasVerified email at unlv.edu
- Yong DengProfessor,University of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Yi PanShenzhen Institute of Advanced Technology, Chinese Academy of Sciences, ChinaVerified email at cs.gsu.edu
- Zhao Kang(康昭)Associate Professor, University of Electronic Science and Technology of China (电子科技大学)Verified email at uestc.edu.cn
- Zenglin XuHarbin Institute of Technology, Shenzhen & Peng Cheng LabVerified email at hit.edu.cn
- Daniel TakabiProfessor and Director of School of Cybersecurity, Old Dominion UniversityVerified email at odu.edu