Get my own profile
Public access
View all11 articles
178 articles
available
not available
Based on funding mandates
Co-authors
- Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
- Hongzhi GuoNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Hiroki NishiyamaTohoku University, JAPANVerified email at ieee.org
- Lei ZhaoUniversity of VictoriaVerified email at uvic.ca
- Zubair Md FadlullahAssociate Professor, Department of Computer Science, Western UniversityVerified email at ieee.org
- Fengxiao Tangtohoku university, central south universityVerified email at it.is.tohoku.ac.jp
- Yuichi KawamotoTohoku UniversityVerified email at ieee.org
- Tiago Koketsu RodriguesTohoku UniversityVerified email at it.is.tohoku.ac.jp
- Kaikai ChiZhejiang University of TechnologyVerified email at zjut.edu.cn
- Juntao GaoNara Institute of Science and TechnologyVerified email at is.naist.jp
- Yuanyuan Qiao (乔媛媛)Professor, BUPTVerified email at bupt.edu.cn
- Ai-Chun PangNational Taiwan UniversityVerified email at csie.ntu.edu.tw
- Yin Chen 陳 寅Graduate School of Media and Governance, Keio University, JapanVerified email at keio.jp
- Jianping PanUniversity of VictoriaVerified email at uvic.ca
- Osamu AkashiNational Institute of InformaticsVerified email at nii.ac.jp
- Zhong-Yuan Jiang (蒋忠元)School of Cyber Engineering, Xidian University, Xi'an, Shaanxi 710071, ChinaVerified email at bjtu.edu.cn
- Xuemin (Sherman) ShenUniversity Professor, University of WaterlooVerified email at uwaterloo.ca
Follow
jiajia liu
Professor, School of Cybersecurity, Northwestern Polytechnical University
Verified email at nwpu.edu.cn