Get my own profile
Public access
View all1 article
9 articles
available
not available
Based on funding mandates
Co-authors
Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
Fengxiao Tangtohoku university, central south universityVerified email at it.is.tohoku.ac.jp
Zubair Md FadlullahAssociate Professor, Department of Computer Science, Western UniversityVerified email at ieee.org
jiajia liuProfessor, School of Cybersecurity, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Takeru InoueNTT Network Innovation Labs.Verified email at ieee.org
Osamu AkashiNational Institute of InformaticsVerified email at nii.ac.jp
Kimihiro MizutaniKindai UniversityVerified email at info.kindai.ac.jp
Yuichi KawamotoTohoku UniversityVerified email at ieee.org
Yishi ZhuTohoku UniversityVerified email at it.is.tohoku.ac.jp
Jiadai WangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Fumie OnoNational Institute of Information and Communications Technology, JAPANVerified email at nict.go.jp
Follow![Bomin Mao](https://usercontent.cljtscd.com/citations?view_op=view_photo&user=LPJpI40AAAAJ&citpid=1)
Bomin Mao
School of Cybersecurity, Northwestern Polytechnical University
Verified email at nwpu.edu.cn