Get my own profile
Public access
View all70 articles
73 articles
available
not available
Based on funding mandates
Co-authors
Xiaofeng TaoBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Wei NiPrincipal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Mikko ValkamaTampere University, FinlandVerified email at tuni.fi
YANZHAO HOUBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Xueqing HuangNew York Institute of TechnologyVerified email at nyit.edu
Kwang-cheng ChenProfessor, Department of Electrical Engineering, University of South Florida; IEEE FellowVerified email at usf.edu
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
Martin HaenggiFreimann Professor of Electrical Engineering and Prof. of Applied Math., University of Notre DameVerified email at nd.edu
Riku JanttiAalto UniversityVerified email at aalto.fi
Mulugeta K. FikaduTampere University of TechnologyVerified email at tut.fi
Bing LuoAssistant Professor of Data and Computational Science, Duke Kunshan UniversityVerified email at duke.edu
Xinlei YuBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Alexis DowhuszkoAalto UniversityVerified email at aalto.fi
Prof. Y. Jay GuoUniversity of Technology Sydney, AustraliaVerified email at uts.edu.au
Na LiBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Follow
Qimei Cui
Professor , School of Information and Communication Engineering ,Beijing University of Posts and
Verified email at bupt.edu.cn