Get my own profile
Public access
View all15 articles
50 articles
available
not available
Based on funding mandates
Co-authors
- Peng ChengProfessor, Zhejiang UniversityVerified email at zju.edu.cn
- Jian ZhangJiangsu Ocean University, ChinaVerified email at jou.edu.cn
- JIMING CHENProfessor at Zhejiang UniversityVerified email at ieee.org
- Wei Xing ZhengDistinguished Professor, Western Sydney University, AustraliaVerified email at westernsydney.edu.au
- Ling ShiHong Kong University of Science and TechnologyVerified email at ust.hk
- Chaoqun YangSoutheast UniversityVerified email at zju.edu.cn
- Zhiguo ShiCollege of Information Science and Electronic Engineering, Zhejiang UniversityVerified email at zju.edu.cn
- Junfeng WuChinese University of Hong Kong, ShenzhenVerified email at cuhk.edu.cn
- Xianghui CaoSoutheast UniversityVerified email at ieee.org
- Huan ZhouNorthwestern Polytechnical UniversityVerified email at ece.ubc.ca
- Shibo HeProfessor, Department of Control, Zhejiang universityVerified email at zju.edu.cn
- Wenchao MengZhejiang UniversityVerified email at zju.edu.cn
- Junjian QiHarold C. Hohbach Endowed Assistant Professor, South Dakota State UniversityVerified email at sdstate.edu
- Jinliang ShaoUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Zhikun ZhangCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Tian HeProfessor, ACM/IEEE Fellow, Department of Computer Science & Engineering, University of MinnesotaVerified email at cs.umn.edu
- Yuanchao ShuMicrosoft ResearchVerified email at microsoft.com
- Ruilong DengProfessor, Zhejiang UniversityVerified email at zju.edu.cn
- Lingkun FuZhejiang University