Get my own profile
Public access
View all4 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Mingsong ChenSoftware Engineering Institute, East China Normal UniversityVerified email at sei.ecnu.edu.cn
- Ting WangEast China Normal UniversityVerified email at sei.ecnu.edu.cn
- Xiang LianAssociate Professor of Computer Science, Kent State UniversityVerified email at kent.edu
- Tongquan weiEast China Normal UniversityVerified email at cs.ecnu.edu.cn
- Shiyan HuProfessor and Chair in Cyber-Physical System Security, University of SouthamptonVerified email at ieee.org
- Junlong ZhouNanjing University of Science and TechnologyVerified email at njust.edu.cn
- Qi WenEast China Normal University, SEVerified email at stu.ecnu.edu.cn
- Jinyan WangGuangxi Normal UniversityVerified email at gxnu.edu.cn
- Zhenfu CaoProfessor of School of Computer Science and Software Engineering, East China Normal UniversityVerified email at sei.ecnu.edu.cn
- Keqin Li (李克勤)SUNY Distinguished Professor, National Distinguished Professor, MAE, AAAS/IEEE/AAIA/ACIS/AIIA FellowVerified email at newpaltz.edu
- Zhiwei LingZhejiang UniversityVerified email at zju.edu.cn