Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
- Yuekang LiLecturer (Assistant Professor), University of New South WalesVerified email at unsw.edu.au
- Hongxu ChenHuawei Technologies Co. LtdVerified email at huawei.com
- Yinxing XueResearch Professor (Pre-Tenure), University of Science and Technology of ChinaVerified email at ustc.edu.cn
- Shengjian (Daniel) GuoApplied Scientist, AWS Proactive SecurityVerified email at amazon.com
- Muhui JiangPh.D. The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Qiang LiuEPFLVerified email at epfl.ch
- Xingwei LinSenior Security Engineer, Ant GroupVerified email at antgroup.com
- Yajin ZhouZhejiang UniversityVerified email at zju.edu.cn
- Yeting LiInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Follow
Cen Zhang
Research Fellow of Nanyang Technological University
Verified email at e.ntu.edu.sg - Homepage