Crea il mio profilo
Accesso pubblico
Visualizza tutto32 articoli
7 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Xiapu LuoThe Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
Le YuNanjing University of Posts and Telecommunications, School of Computer ScienceEmail verificata su polyu.edu.hk
Guofei GuProfessor, Department of Computer Science & Engineering, Texas A&M UniversityEmail verificata su cse.tamu.edu
Tao ZhangSchool of Computer Science and Engineering, Macau University of Science and TechnologyEmail verificata su must.edu.mo
Yajin ZhouZhejiang UniversityEmail verificata su zju.edu.cn
Zhou XUChongqing University & The Hong Kong Polytechnic UniversityEmail verificata su cqu.edu.cn
Dinghao WuPennsylvania State UniversityEmail verificata su psu.edu
Yuru ShaoPinterestEmail verificata su pinterest.com
CHENXIONG QIANThe University of Hong KongEmail verificata su cs.hku.hk
Ang ChenUniversity of MichiganEmail verificata su umich.edu
TANG QIYIInformation Security Researcher, TencentEmail verificata su tencent.com
Ming Fan (范铭)Xi'an Jiaotong UniversityEmail verificata su mail.xjtu.edu.cn
Qiao KangRice UniversityEmail verificata su rice.edu
Alvin T.S. ChanAssociate Professor, Singapore Institute of TechnologyEmail verificata su SingaporeTech.edu.sg
Guozi Sun (孙国梓)Professor, Nanjing University of Posts and TelecommunicationsEmail verificata su njupt.edu.cn
Muhui JiangPh.D. The Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
Fengwei ZhangAssociate Professor, Southern University of Science and TechnologyEmail verificata su sustech.edu.cn
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
Bo AnNanyang Technological UniversityEmail verificata su ntu.edu.sg
cong shiSchool of Computer Science, Georgia Institute of TechnologyEmail verificata su gatech.edu