Get my own profile
Public access
View all10 articles
40 articles
available
not available
Based on funding mandates
Co-authors
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Guanggang GengJinan UniversityVerified email at jnu.edu.cn
- Xiaoping LiuVerified email at lakeheadu.ca
- Luo Xin (罗辛)Southwest UniversityVerified email at swu.edu.cn
- Xuefeng ZhouInstitute of Intelligent Manufacturing, Guangdong Academy of SciencesVerified email at giim.ac.cn
- Hongliang GuoInstitute for Infocomm Research (I2R), Agency for Science, Technology and ResearchVerified email at i2r.a-star.edu.sg
- Ameer Hamza KhanResearch Assistant Professor, Smart City Research Institute, The Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
- Seifedine Kadry, Fellow IETNoroff University CollegeVerified email at noroff.no
- Jie GuiSoutheast University, ChinaVerified email at ustc.edu
- Ameer Tamoor KhanPostdoc, University of CopenhagenVerified email at plen.ku.dk
- Jianxiao ZouProfessor of University of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Jilian ZhangJinan University, Guangzhou ChinaVerified email at smu.edu.sg
- Yonghua YinImperial College LondonVerified email at imperial.ac.uk
- Yongdong WuVerified email at i2r.a-star.edu.sg
- Ming-Sheng ShangChongqing Institute of Green and Intelligent Technology, Chinese Academy of SciencesVerified email at cigit.ac.cn