Get my own profile
Public access
View all14 articles
22 articles
available
not available
Based on funding mandates
Co-authors
Yiu-ming Cheung, PhD, Chair Profess...Department of Computer Science, Hong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk
Shaohua TANGProfessor of Computer Science, South China University of TechnologyVerified email at scut.edu.cn
Yun-Qing ShiProfessor of Electrical and Computer Engineering, New Jersey Institute of Technology Verified email at njit.edu
Jiwu HuangShenzhen UniversityVerified email at szu.edu.cn
Jean-luc DugelayProfessor, Imaging Security, EURECOMVerified email at eurecom.fr
Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
Xinpeng Zhang (张新鹏)Professor, Shanghai University/Fudan UniversityVerified email at shu.edu.cn
Xiaolong LIInstitute of Information Science, Beijing Jiaotong UniversityVerified email at bjtu.edu.cn
Bowen Zhao (赵搏文)Xidian UniversityVerified email at smu.edu.sg
Xinglin ZhangProfessor, South China University of TechnologyVerified email at scut.edu.cn
Junhui HeSouth China University of TechnologyVerified email at scut.edu.cn
Xingfu YanSouth China Normal UniversityVerified email at m.scnu.edu.cn
Tian Zhihong(田志宏)Professor; Guangzhou UniversityVerified email at gzhu.edu.cn
Benjamin TurnbullUniversity of New South WalesVerified email at unsw.edu.au
Xiaofeng ChenProfessor, Xidian University, ChinaVerified email at xidian.edu.cn
Jin Li 李进Professor @Guangzhou UniversityVerified email at gzhu.edu.cn
Fangguo ZhangSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Jane You, Professorthe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Lingfeng QuSouthwest Jiaotong UniversityVerified email at my.swjtu.edu.cn