Get my own profile
Public access
View all1 article
41 articles
available
not available
Based on funding mandates
Co-authors
- jiajia liuProfessor, School of Cybersecurity, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
- Yanning ZhangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Bomin MaoSchool of Cybersecurity, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Qingcai ChenProfessor, Harbin Institute of Technology (Shenzhen)Verified email at hit.edu.cn
- Lei ZhaoUniversity of VictoriaVerified email at uvic.ca
- Huiling QinBeijing Normal UniversityVerified email at bnu.edu.cn
- Shangwei ZhangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Zubair Md FadlullahAssociate Professor, Department of Computer Science, Western UniversityVerified email at ieee.org
- Jiadai WangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Hiroki NishiyamaTohoku University, JAPANVerified email at ieee.org
- Qiang YuAssociate Professor of Computer Science and Technology, Xidian UniversityVerified email at mail.xidian.edu.cn
- Ju RenDepartment of Computer Science and Technology, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Yonghui WuAssociate Professor, University of FloridaVerified email at ufl.edu
- Jun Xu (徐军)AI as Services, Visa Inc.Verified email at visa.com
- Abderrahim BenslimaneFull Professor of Computer Science, Avignon University, FranceVerified email at univ-avignon.fr
- Yijie XunNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Yinbo YuNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Haibin ZhangSenior scientist, TNOVerified email at tno.nl