Get my own profile
Public access
View all40 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Li ZhengBeijing University of TechnologyVerified email at mail.sdu.edu.cn
Willi MeierFHNWVerified email at fhnw.ch
Siwei SunChinese Academy of SciencesVerified email at ucas.ac.cn
Anubhab BaksiNanyang Technological University, SingaporeVerified email at e.ntu.edu.sg
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Zhiyu ZhangPHD candidate, Institute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
Meiqin WangProfessor of Mathematics, Shandong UniversityVerified email at sdu.edu.cn
Anyu WangInstitute for Advanced Study, Tsinghua University,Verified email at mail.tsinghua.edu.cn
Gaoli WangEast China Normal University, professorVerified email at sei.ecnu.edu.cn
Fei GaoProfessor of Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Yunwen LiuCryptographer