Get my own profile
Public access
View all74 articles
17 articles
available
not available
Based on funding mandates
Co-authors
Hao WangNorwegian University of Science and TechnologyVerified email at acm.org
Muhammad ImranFederation University, AustraliaVerified email at ieee.org
Xiangping ChenSun Yat-sen UniversityVerified email at sysu.edu.cn
Qubeijian WangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Min-You WuComputer Science, Shanghai Jiaotong UniversityVerified email at sjtu.edu.cn
Raymond Chi-Wing WongThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
junhao zhouMacau University of Science and TechnologyVerified email at student.must.edu.mo
Jiajing WuSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Yalin LiuHong Kong Metropolitan UniversityVerified email at hkmu.edu.hk
Yan ZhangIEEE Fellow, Highly Cited Researcher, University of Oslo, NorwayVerified email at ifi.uio.no
Shaoan XieCarnegie Mellon UniversityVerified email at cmu.edu
Guangquan XuTianjin UniversityVerified email at tju.edu.cn
Mahendra K. ShuklaAssistant Professor, ABV-Indian Institute of Information Technology and Management GwaliorVerified email at iiitm.ac.in
Jiafu WanProfessor, Highly Cited Researcher (2019-2022), South China University of TechnologyVerified email at scut.edu.cn
Weili ChenSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Zehui XiongAssistant Professor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Xi ZhengMacquarie UniversityVerified email at mq.edu.au
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Dengwang LiLaboratory for Medical Physics and Image ProcessingVerified email at stanford.edu
Subrota Kumar MondalMacau University of Science and TechnologyVerified email at must.edu.mo