Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jin ZheProfessor, Anhui UniversityVerified email at ahu.edu.cn
- Jiajun ShenDeepMindVerified email at deepmind.com
- Andrew Teoh Beng JinProfessor of Electrical and Electronic Engineering, Yonsei University, KoreaVerified email at yonsei.ac.kr
- Massimo TistarelliFull Professor in Computer Science, University of SassariVerified email at uniss.it
- KokSheik WongMonash University MalaysiaVerified email at monash.edu
- Jiewen YangThe Hong Kong University of Science & TechnologyVerified email at connect.ust.hk
- Zhenhua GuoTianyijiaotong Technology Ltd., ChinaVerified email at sz.tsinghua.edu.cn
- Jean-luc DugelayProfessor, Imaging Security, EURECOMVerified email at eurecom.fr
- Zhihui MiaoMaster of electronic information, Fuzhou UniversityVerified email at fzu.edu.cn
- Dahai YuPh.D, General Manager of TCL Corporation Research (HongKong)Verified email at tcl.com
- Wanyan XuFuzhou UniversityVerified email at fzu.edu.cn
- Hanrui WangNational Institute of InformaticsVerified email at nii.ac.jp
- Hui ZhangAnhui UniversityVerified email at stu.ahu.edu.cn
- Khawla MallatResearch scientist, SAP, FranceVerified email at sap.com
- Jin KeongMonash University MalaysiaVerified email at monash.edu
- Muhammad Khurram Khan[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]Verified email at ksu.edu.sa