Get my own profile
Public access
View all5 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- XiaoJun ChenInstitute of Information EngineeringVerified email at iie.ac.cn
- Kaiyun Li百度Verified email at baidu.com
- Zhendong zhaoiie.casVerified email at iie.ac.cn
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Ruisheng ShiBUPT (Beijing University of Posts and Telecommunications)Verified email at bupt.edu.cn
- Cheng HONGDirector of Cryptography and Privacy Research, Ant GroupVerified email at antgroup.com
- Zhicong HuangAnt GroupVerified email at antgroup.com
- Tan JinEngineer, Ant GroupVerified email at antgroup.com
- Wen-jie LuZhejiang UniversityVerified email at zju.edu.cn
- Tao WeiVice President, Ant FinancialVerified email at antfin.com
- Haoqi WuTiktokVerified email at fudan.edu.cn
- Derun ZhaoAnt GroupVerified email at antgroup.com
- Hao WangShandong Normal UniversityVerified email at sdnu.edu.cn
- Shengli PanBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
- Xiangfu SongNational University of SingaporeVerified email at comp.nus.edu.sg
- Peng ZhangProfessor, Guangzhou UniversityVerified email at gzhu.edu.cn
- Shujie CuiMonash UniversityVerified email at monash.edu
- Yun Sing KohThe University of AucklandVerified email at auckland.ac.nz
- Giovanni RusselloProfessor and Head of School of Computer Science, University of AucklandVerified email at auckland.ac.nz
- Lei ZhouSUSTechVerified email at sustech.edu.cn
Follow
Ye Dong
Other names董业 (in Chinese)
Postdoctoral Research Fellow, Singapore University of Technology and Design (SUTD)
Verified email at sutd.edu.sg - Homepage