Get my own profile
Public access
View all6 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Cong WangDepartment of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
- Qian WangIEEE Fellow, Professor, School of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
- Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityVerified email at monash.edu
- Yifeng ZhengHarbin Institute of TechnologyVerified email at hit.edu.cn
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Shengshan HuSchool of CSE, Huazhong University of Science and Technology (HUST)Verified email at hust.edu.cn
- Kui RenProfessor and Dean of Computer Science, Zhejiang University, ACM/IEEE FellowVerified email at zju.edu.cn
- Jiasi Weng (翁嘉思)Jinan University (Guangzhou)Verified email at jnu.edu.cn
- Lei XuNanjing University of Science and TechnologyVerified email at njust.edu.cn
- Yuefeng DuResearcher, City University of Hong KongVerified email at cityu.edu.hk
- Yu GuoBeijing Normal UniversityVerified email at bnu.edu.cn