Crea il mio profilo
Accesso pubblico
Visualizza tutto68 articoli
83 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
David Dagan FengThe University of SydneyEmail verificata su sydney.edu.au
Po YangProfessor of Pervasive Intelligence at the Sheffield UniversityEmail verificata su sheffield.ac.uk
Huating LiShanghai Jiao Tong UniversityEmail verificata su sjtu.edu.cn
Jinman KimSchool of Computer Science, University of SydneyEmail verificata su sydney.edu.au
C. L. Philip ChenChair Professor, South China University of Technology, [email protected]Email verificata su scut.edu.cn
Lei ZhuHong Kong University of Science and TechnologyEmail verificata su ust.hk
Hanqiu SunThe Chinese University of Hong KongEmail verificata su cse.cuhk.edu.hk
YOUNHYUN JUNGGachon UniversityEmail verificata su gachon.ac.kr
Di LinAssociate Professor, Tianjin UniversityEmail verificata su tju.edu.cn
Rui-Min ShenProfessor of Computer Science, Shanghai Jiao Tong UniversityEmail verificata su sjtu.edu.cn
Tong-Yee LeeNational Cheng-Kung UniversityEmail verificata su mail.ncku.edu.tw
Yongwei NieSouth China University of TechnologyEmail verificata su scut.edu.cn
Saba Ghazanfar AliShanghai Jiao Tong UniversityEmail verificata su sjtu.edu.cn
Kamel AouaidjiaHenan UniversityEmail verificata su henu.edu.cn
Anam NazirCOMSATS university Islamabad, Wah canttEmail verificata su ciitwah.edu.pk
Muhammad Nadeem CheemaUniversity of Texas Health Science Center Houston, USAEmail verificata su uth.tmc.edu
Lizhuang Ma (马利庄)Shanghai Jiao Tong UniversityEmail verificata su cs.sjtu.edu.cn
Yuxi JinShenzhen Institute of Advanced Technology, Chinese Academy of SciencesEmail verificata su siat.ac.cn
Chunxia XiaoProfessor of Computer Science, Wuhan UniversityEmail verificata su whu.edu.cn
Qing Zhang (张青)Sun Yat-sen UniversityEmail verificata su mail.sysu.edu.cn