Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Zhenjun Tang (唐振军)PhD, Professor, School of Computer Science and Engineering, Guangxi Normal UniversityVerified email at gxnu.edu.cn
- Chunqiang YuGuangxi Normal UniversityVerified email at mailbox.gxnu.edu.cn
- Heng YaoUniversity of Shanghai for Science and TechnologyVerified email at usst.edu.cn
- Chuan QinPh.D., Professor, University of Shanghai for Science and Technology, ChinaVerified email at usst.edu.cn
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Guanggang GengJinan UniversityVerified email at jnu.edu.cn
- Jinyan WangGuangxi Normal UniversityVerified email at gxnu.edu.cn
- Dengpan YeWuhan UniversityVerified email at whu.edu.cn
- Jilian ZhangJinan University, Guangzhou ChinaVerified email at smu.edu.sg
- Zhenxing Qian (钱振兴)Professor, Fudan UniversityVerified email at fudan.edu.cn
- Xiao-Bo JinXi'an Jiaotong-Liverpool UniversityVerified email at xjtlu.edu.cn
- Dong-Jie LiuJinan UniversityVerified email at mails.ucas.ac.cn