Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
50 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Peng ChengProfessor, Zhejiang UniversityEmail verificata su zju.edu.cn
- Jian ZhangJiangsu Ocean University, ChinaEmail verificata su jou.edu.cn
- JIMING CHENProfessor at Zhejiang UniversityEmail verificata su ieee.org
- Wei Xing ZhengDistinguished Professor, Western Sydney University, AustraliaEmail verificata su westernsydney.edu.au
- Ling ShiHong Kong University of Science and TechnologyEmail verificata su ust.hk
- Chaoqun YangSoutheast UniversityEmail verificata su zju.edu.cn
- Zhiguo ShiCollege of Information Science and Electronic Engineering, Zhejiang UniversityEmail verificata su zju.edu.cn
- Junfeng WuChinese University of Hong Kong, ShenzhenEmail verificata su cuhk.edu.cn
- Xianghui CaoSoutheast UniversityEmail verificata su ieee.org
- Huan ZhouNorthwestern Polytechnical UniversityEmail verificata su ece.ubc.ca
- Shibo HeProfessor, Department of Control, Zhejiang universityEmail verificata su zju.edu.cn
- Wenchao MengZhejiang UniversityEmail verificata su zju.edu.cn
- Junjian QiHarold C. Hohbach Endowed Assistant Professor, South Dakota State UniversityEmail verificata su sdstate.edu
- Jinliang ShaoUniversity of Electronic Science and Technology of ChinaEmail verificata su uestc.edu.cn
- Zhikun ZhangCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Tian HeProfessor, ACM/IEEE Fellow, Department of Computer Science & Engineering, University of MinnesotaEmail verificata su cs.umn.edu
- Yuanchao ShuMicrosoft ResearchEmail verificata su microsoft.com
- Ruilong DengProfessor, Zhejiang UniversityEmail verificata su zju.edu.cn
- Lingkun FuZhejiang University