Get my own profile
Public access
View all28 articles
42 articles
available
not available
Based on funding mandates
Co-authors
Abbas Jamalipour, Fellow IEEE, Fello...Professor of Ubiquitous Mobile Networking, The University of SydneyVerified email at ieee.org
Lei GuoChongqing University of Posts and TelecommunicationsVerified email at cqupt.edu.cn
Zhaolong Ning(宁兆龙)Professor, Highly Cited Researcher, Chongqing University of Posts and TelecommunicationsVerified email at ieee.org
Shiqiang WangIBM T. J. Watson Research CenterVerified email at us.ibm.com
Peng LinNanjing University of Information Science and Technology, ChinaVerified email at nuist.edu.cn
Yang HuangNanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
Xuetao WeiAssociate Professor, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Weigang HouNortheastern university, Shenyang, ChinaVerified email at cse.neu.edu.cn
Xiaoxue GongChongqing University of Posts and TelecommunicationsVerified email at cqupt.edu.cn
Komal S. KhanCyber Defense Specialist, DarktraceVerified email at ieee.org
Tie QiuTianjin UniversityVerified email at ieee.org
Yue ZongNortheastern UniversityVerified email at stumail.neu.edu.cn
Xiangjie Kong (孔祥杰)Professor of Computer Science, Zhejiang University of TechnologyVerified email at ieee.org