Get my own profile
Public access
View all34 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Guanrong ChenCity University of Hong KongVerified email at cityu.edu.hk
K.T. LoAssociate Professor, Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Jinhu LuProfessor of Beihang UniversityVerified email at iss.ac.cn
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
Gonzalo AlvarezCSICVerified email at iec.csic.es
Dongdong Lin (林东东)Shenzhen UniversityVerified email at email.szu.edu.cn
David Arroyo (ORCID: 0000-0001-889...CSIC (ROR 00zsy6110)Verified email at csic.es
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Qianxue WangGuangdong University of TechnologyVerified email at gdut.edu.cn
Jürgen KurthsProfessor of Physics, Humboldt University BerlinVerified email at pik-potsdam.de
Siwang Zhou (周四望)Hunan UniversityVerified email at hnu.edu.cn
Yonghe LiuThe University of Texas at ArlingtonVerified email at cse.uta.edu
Lei ChenVerified email at bupt.edu.cn
Xiaowei Li (李小伟)Professor, Sichuan University, Electronic & Information EngineeringVerified email at scu.edu.cn
Hongbo JiangHunan UniversityVerified email at hnu.edu.cn
C.-C. Jay KuoMing Hsieh Chair Professor in ECE-Systems, University of Southern CaliforniaVerified email at sipi.usc.edu
Der-Chyuan LouDepartment of Computer Science and Information Engineering, Chang Gung University, Taoyuan 33302Verified email at mail.cgu.edu.tw
Xu QuanChangzhou UniversityVerified email at cczu.edu.cn
Ruiyuan LinUniversity of Southern CaliforniaVerified email at usc.edu
Ke YouXiangtan UniversityVerified email at smail.xtu.edu.cn