Get my own profile
Public access
View all25 articles
40 articles
available
not available
Based on funding mandates
Co-authors
- Abbas Jamalipour, Fellow IEEE, Fello...Professor of Ubiquitous Mobile Networking, The University of SydneyVerified email at ieee.org
- Lei GuoChongqing University of Posts and TelecommunicationsVerified email at cqupt.edu.cn
- Zhaolong Ning(宁兆龙)Professor, Highly Cited Researcher, Chongqing University of Posts and TelecommunicationsVerified email at ieee.org
- Shiqiang WangIBM T. J. Watson Research CenterVerified email at us.ibm.com
- Peng LinNanjing University of Information Science and Technology, ChinaVerified email at nuist.edu.cn
- Yang HuangNanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
- Weigang HouNortheastern university, Shenyang, ChinaVerified email at cse.neu.edu.cn
- Xuetao WeiAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
- Xiaoxue GongChongqing University of Posts and TelecommunicationsVerified email at cqupt.edu.cn
- Komal S. KhanCyber Defense Specialist, DarktraceVerified email at ieee.org
- Tie QiuTianjin UniversityVerified email at ieee.org
- Yue ZongNortheastern UniversityVerified email at stumail.neu.edu.cn
- Xiangjie Kong (孔祥杰)Professor of Computer Science, Zhejiang University of TechnologyVerified email at ieee.org