Get my own profile
Public access
View all131 articles
76 articles
available
not available
Based on funding mandates
Co-authors
Yi PanShenzhen Institute of Advanced Technology, Chinese Academy of Sciences, ChinaVerified email at cs.gsu.edu
chunxue wuusst教授Verified email at usst.edu.cn
Liansheng TanProfessor of Computer Communications, Central China Normal UniversityVerified email at mail.ccnu.edu.cn
Hongju ChengProfessor, Fuzhou UniversityVerified email at fzu.edu.cn
Anfeng LiuCentral South University, ChinaVerified email at mail.csu.edu.cn
Weiwei Fang (方维维)Assoicate Professor, School of Computer and Information Technology, Beijing Jiaotong UniversityVerified email at bjtu.edu.cn
Wen LIU (刘文)Wuhan University of Technology | 武汉理工大学Verified email at whut.edu.cn
Tai-hoon KimSungshin UniversityVerified email at daum.net
Yingshu LiProfessor, Georgia State UniversityVerified email at gsu.edu
Changhoon LeeProfessor of Seoul National University of Science & Technology (SeoulTech)Verified email at seoultech.ac.kr
Zhihua XiaNanjing University of Information Science & TechnologyVerified email at nuist.edu.cn
Yan ZhangIEEE Fellow, Highly Cited Researcher, University of Oslo, NorwayVerified email at ifi.uio.no
Tian Wang (王田)Beijing Normal University, UIC, Huaqiao UniversityVerified email at bnu.edu.cn
Y. Richard YangProfessor of Computer Science at Yale UniversityVerified email at cs.yale.edu
Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
Guangquan XuTianjin UniversityVerified email at tju.edu.cn
Art VandenbergGeorgia State UniversityVerified email at gsu.edu
Athanasios VasilakosPROF OF COMPLEX SYSTEMS, CYBERSECURITY, AI
Follow
Naixue Xiong, Neal Xiong, Neal N. Xiong, Nai-xue Xiong, Neil Xiong
Colorado Technical University, Northeastern State University
Verified email at nsuok.edu