Get my own profile
Public access
View all2 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
- Katsuya SutoThe University of Electro-CommunicationsVerified email at ieee.org
- Hiroki NishiyamaTohoku University, JAPANVerified email at ieee.org
- jiajia liuProfessor, School of Cybersecurity, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Fengxiao Tangtohoku university, central south universityVerified email at it.is.tohoku.ac.jp
- Sai XuUniversity of SheffieldVerified email at ieee.org
- Mostafa M. FoudaIdaho State University, USAVerified email at isu.edu
- Yuichi KawamotoTohoku UniversityVerified email at ieee.org
- Shikhar VermaAssistant Professor at Graduate School of Information Science, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
- QI GUOTohoku UniversityVerified email at tohoku.ac.jp
- Won Joon YunKorea UniversityVerified email at korea.ac.kr
- Soyi JungAssistant Professor, Department of Electrical and Computer Engineering, Ajou UniversityVerified email at ajou.ac.kr
- Soohyun ParkSookmyung Women's UniversityVerified email at sookmyung.ac.kr
- Joongheon KimKorea University Professor (Electrical Engineering) | USC PhD (Computer Science)Verified email at korea.ac.kr
- Shangwei ZhangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Muhammad IsmailDirector of CEROC and Associate Professor of Computer Science, Tennessee Tech UniversityVerified email at tntech.edu
- Takeru InoueNTT Network Innovation Labs.Verified email at ieee.org
- Kimihiro MizutaniKindai UniversityVerified email at info.kindai.ac.jp
- Osamu AkashiNational Institute of InformaticsVerified email at nii.ac.jp
- Kun-Ta ChuangNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw