Get my own profile
Public access
View all15 articles
17 articles
available
not available
Based on funding mandates
Co-authors
Tiejun LvSchool of Elec. Engeering, Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
Wei NiPrincipal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Zhipeng LinNanjing University of Aeronautics and AstronauticsVerified email at ieee.org
Prof. Y. Jay GuoUniversity of Technology Sydney, AustraliaVerified email at uts.edu.au
Xiaojing HuangProfessor of ICT, University of Technology SydneyVerified email at uts.edu.au
Mehran AbolhasanProfessor, University of Technology SydneyVerified email at uts.edu.au
Gordon SuttonUniversity of Technology SydneyVerified email at uts.edu.au
Diep N. NguyenUniversity of Technology SydneyVerified email at uts.edu.au
P. Takis MathiopoulosNational and Kapodistrian University of AthensVerified email at di.uoa.gr
Hui GaoBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Yi ZhongBeijing Institute of TechnologyVerified email at bit.edu.cn
Jian (Andrew) ZhangProf, University of Technology SydneyVerified email at uts.edu.au
Chau YuenIEEE Fellow, Highly Cited Researcher, Nanyang Technological UniversityVerified email at ntu.edu.sg
Gaofeng PanThe School of Cyberspace Science and Technology, Beijing Institute of TechnologyVerified email at ieee.org
Yi XuAmazon.comVerified email at amazon.com
Norman BeaulieuThousand Talents Professor Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Fangqing TanGuilin University of Electronic TechnologyVerified email at guet.edu.cn