Get my own profile
Public access
View all33 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Siwei SunChinese Academy of SciencesVerified email at ucas.ac.cn
- Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
- Qianqian YangInstitute of Information Engineering, Chinese Academy of Sciences, Beijing, ChinaVerified email at iie.ac.cn
- Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
- Peng WangIIEVerified email at is.ac.cn
- Guozhen LiuUniversity of Chinese Academy of SciencesVerified email at ucas.ac.cn
- Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Carlos CidSimula UiB and Okinawa Institute of Science and TechnologyVerified email at simula.no
- Jinyong Shan北京智芯微电子科技有限公司Verified email at sgchip.sgcc.com.cn
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Chun Guo (郭淳)Shandong UniversityVerified email at sdu.edu.cn
- Mohona GhoshAssistant Professor, Indira Gandhi Delhi Technical University for WomenVerified email at igdtuw.ac.in
- QIN XIANRUIThe University of Hong KongVerified email at cs.hku.hk
- S LingNanyang Technological UniversityVerified email at ntu.edu.sg
- Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
- Jérémy JEANANSSIVerified email at ssi.gouv.fr
- Henri GilbertANSSIVerified email at ssi.gouv.fr
- Libo WangUniversity of Hyogo, JapanVerified email at mails.ucas.edu.cn
- Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de