Get my own profile
Public access
View all2 articles
43 articles
available
not available
Based on funding mandates
Co-authors
jiajia liuProfessor, School of Cybersecurity, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
Yanning ZhangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Bomin MaoSchool of Cybersecurity, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Qingcai ChenProfessor, Harbin Institute of Technology (Shenzhen); Peng Cheng LaboratoryVerified email at hit.edu.cn
Lei ZhaoUniversity of VictoriaVerified email at uvic.ca
Jiadai WangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Huiling QinBeijing Normal UniversityVerified email at bnu.edu.cn
Shangwei ZhangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Zubair Md FadlullahAssociate Professor, Department of Computer Science, Western UniversityVerified email at ieee.org
Hiroki NishiyamaTohoku University, JAPANVerified email at ieee.org
Ju RenDepartment of Computer Science and Technology, Tsinghua UniversityVerified email at tsinghua.edu.cn
Qiang YuAssociate Professor of Computer Science and Technology, Xidian UniversityVerified email at mail.xidian.edu.cn
Yonghui WuAssociate Professor, University of FloridaVerified email at ufl.edu
Yijie XunNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Abderrahim BenslimaneFull Professor of Computer Science, Avignon University, FranceVerified email at univ-avignon.fr
Jun Xu (徐军)AI as Services, Visa Inc.Verified email at visa.com
Yinbo YuNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Haibin ZhangSenior scientist, TNOVerified email at tno.nl