Get my own profile
Public access
View all76 articles
72 articles
available
not available
Based on funding mandates
Co-authors
Xiaojiang Du, Endowed-Chair Profess...Stevens Institute of TechnologyVerified email at stevens.edu
Shen SuGuangzhou UniversityVerified email at gzhu.edu.cn
Jing QiuGuangzhou University, Pengcheng LaboratoryVerified email at gzhu.edu.cn
Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Verified email at mbzuai.ac.ae
Wei ShiProfessor, P. Eng. School of Info. Tech./System and Computer Engineering, Faculty of EngineeringVerified email at carleton.ca
Chunsheng ZhuThe University of British ColumbiaVerified email at ece.ubc.ca
Yuhang WangUniversity of South-Eastern NorwayVerified email at ntnu.no
Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
Zhaoquan GuCyberspace Institute of Advanced Technology (CIAT), Guangzhou UniversityVerified email at gzhu.edu.cn
Weizhe ZhangProfessor of Peng Cheng Laboratory & Harbin Institute of TechnologyVerified email at hit.edu.cn
Qingfeng TanInstitute of Information Engineering, CASVerified email at iie.ac.cn
Yuan LiuGuangzhou UniversityVerified email at swc.neu.edu.cn