Get my own profile
Public access
View all44 articles
13 articles
available
not available
Based on funding mandates
Co-authors
Debiao He (何德彪)Wuhan UniversityVerified email at whu.edu.cn
Xinyi Huang(黄欣沂)Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and TechnologyVerified email at ust.hk
Sendong (Stan) ZhaoHarbin Institute of TechnologyVerified email at ir.hit.edu.cn
Chao-Hsien Chu 朱昭贤Professor of Information Sciences and Technology, Pennsylvania State UniversityVerified email at ist.psu.edu
Jeff YanProfessor of Cyber SecurityVerified email at acm.org
Yudi ZhangUniversity of WollongongVerified email at uow.edu.au
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Saru KumariAssociate Professor, Department of Mathematics, Ch. Charan Singh University, MeerutVerified email at ccsuniversity.ac.in
Yuan TianAssistant Professor, University of California, Los AngelesVerified email at ucla.edu
Zengpeng LiShandong University
Follow
Ding Wang(汪 定)
College of Cyber Science, Nankai University, Tianjin 300350, China
Verified email at nankai.edu.cn - Homepage