Get my own profile
Public access
View all32 articles
39 articles
available
not available
Based on funding mandates
Co-authors
- Fan Li (李凡)Professor of School of Computer Science, Beijing Institute of TechnologyVerified email at bit.edu.cn
- liehuang zhuBeijing Institute of TechnologyVerified email at bit.edu.cn
- Chang XUAssociate Professor, Beijing Institute of Technology, Beijing, ChinaVerified email at bit.edu.cn
- Yu Wang (王昱)Professor of Computer and Information Sciences, FIEEE, DMACM, Temple UniversityVerified email at temple.edu
- Sujit Biswas, PhDLecturer (Asst. Prof.), City, University of London, UK; Research Associate, UCL, UKVerified email at city.ac.uk
- Boubakr NourCybersecurity Researcher, Ericsson, Montreal, CanadaVerified email at ericsson.com
- Zohaib LatifAssistant Professor, Nazarbayev University, KazakhstanVerified email at bit.edu.cn
- Saraju P. MohantyProfessor, University of North TexasVerified email at unt.edu
- Meng ShenBeijing Institute of TechnologyVerified email at bit.edu.cn