Get my own profile
Public access
View all33 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Siwei SunChinese Academy of SciencesVerified email at ucas.ac.cn
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Qianqian YangInstitute of Information Engineering, Chinese Academy of Sciences, Beijing, ChinaVerified email at iie.ac.cn
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Peng WangIIEVerified email at is.ac.cn
Guozhen LiuUniversity of Chinese Academy of SciencesVerified email at ucas.ac.cn
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Carlos CidSimula UiB and Okinawa Institute of Science and TechnologyVerified email at simula.no
Jinyong Shan北京智芯微电子科技有限公司Verified email at sgchip.sgcc.com.cn
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Chun Guo (郭淳)Shandong UniversityVerified email at sdu.edu.cn
Mohona GhoshAssistant Professor, Indira Gandhi Delhi Technical University for WomenVerified email at igdtuw.ac.in
QIN XIANRUIThe University of Hong KongVerified email at cs.hku.hk
S LingNanyang Technological UniversityVerified email at ntu.edu.sg
Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
Libo WangUniversity of Hyogo, JapanVerified email at mails.ucas.edu.cn
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Henri GilbertANSSIVerified email at ssi.gouv.fr
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de