Get my own profile
Public access
View all148 articles
121 articles
available
not available
Based on funding mandates
Co-authors
Hong GaoZhejiang Normal UniversityVerified email at zjnu.edu.cn
Yingshu LiProfessor, Georgia State UniversityVerified email at gsu.edu
Wei (Lisa) LiAssistant Professor, Department of Computer Science, Georgia State UniversityVerified email at gsu.edu
Zaobo HeJinan University (暨南大学)Verified email at jnu.edu.cn
xu zhengUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Guohui LinComputing Science, University of AlbertaVerified email at ualberta.ca
Jiguo YuUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Quan ChenGuangdong University of TechnologyVerified email at gdut.edu.cn
Tuo ShiAalto UniversityVerified email at aalto.fi
Yan HuangKennesaw State UniversityVerified email at kennesaw.edu
Zuobin XiongAssistant Professor, Dept. of Computer Science, University of Nevada, Las VegasVerified email at unlv.edu
Xiu-Feng Wan or Xiufeng WanUniversity of Missouri-ColumbiaVerified email at missouri.edu
Yi PanShenzhen University of Advanced Technology, ChinaVerified email at cs.gsu.edu
Dongxiao YuProfessor of Computer Science, Shandong UniversityVerified email at sdu.edu.cn
Raheem BeyahDean and Southern Company Chair, Georgia Tech College of EngineeringVerified email at ece.gatech.edu
Meng HanIntelligence Fusion Research Center (IFRC)Verified email at zju.edu.cn
Randy GoebelProfessor of Computing Science, University of AlbertaVerified email at ualberta.ca
Dongjing MiaoHarbin Institute of TechnologyVerified email at hit.edu.cn
Daniel TakabiProfessor and Director of School of Cybersecurity, Old Dominion UniversityVerified email at odu.edu
Tongxin ZhuSoutheast UniversityVerified email at seu.edu.cn
Follow