Get my own profile
Public access
View all88 articles
138 articles
available
not available
Based on funding mandates
Co-authors
Jin Li 李进Professor @Guangzhou UniversityVerified email at gzhu.edu.cn
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Fangguo ZhangSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Jianfeng WangProfessor, Xidian University, ChinaVerified email at xidian.edu.cn
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Wenjing LouW. C. English Endowed Professor, IEEE Fellow, Virginia Tech, USAVerified email at vt.edu
Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
kwangjo kimProfessor, Computer Science Department, KAISTVerified email at kaist.ac.kr
Jian ShenZhejiang Sci-Tech UniversityVerified email at zstu.edu.cn
Yi MuProfessorVerified email at cityu.mo
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Ilsun YouKookmin UniversityVerified email at kookmin.ac.kr
Patrick P. C. LeeThe Chinese University of Hong KongVerified email at cse.cuhk.edu.hk
Meixia MiaoXidian UniversityVerified email at xidian.edu.cn
Hui LiProfessor, School of Computer Science and Technology, Xidian UniversityVerified email at xidian.edu.cn
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Kui RenProfessor and Dean of Computer Science, Zhejiang University, ACM/IEEE FellowVerified email at zju.edu.cn
Tsz Hon YuenMonash UniversityVerified email at monash.edu