Get my own profile
Public access
View all56 articles
44 articles
available
not available
Based on funding mandates
Co-authors
Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Georgios B. GiannakisMcKnight Presidential Chair in ECE Dept., University of MinnesotaVerified email at umn.edu
Tianyi ChenAssistant Professor, Rensselaer Polytechnic InstituteVerified email at rpi.edu
XIAOJING CHENShanghai UniversityVerified email at shu.edu.cn
Shuyan HuFudan UniversityVerified email at fudan.edu.cn
Feng WangGuangdong University of TechnologyVerified email at gdut.edu.cn
Xiaojun YuanUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Antonio G. MarquesProfessor of ECE, King Juan Carlos University (Universidad Rey Juan Carlos), MadridVerified email at urjc.es
Qingwen LiuTongji UniversityVerified email at tongji.edu.cn
Iain CollingsMacquarie UniversityVerified email at mq.edu.au
Zhaoxi FangShaoxing UniversityVerified email at msu.edu
Yi JiangFudan UniversityVerified email at fudan.edu.cn
Yu ZhangAssistant Professor, University of California, Santa CruzVerified email at ucsc.edu
Yongwei HuangSchool of Information Engineering, Guangdong University of TechnologyVerified email at gdut.edu.cn
Hanqi ZhuangFAUVerified email at fau.edu
Jitendra K TugnaitJames B Davis Professor of Electrical & Computer Engineering, Auburn UniversityVerified email at auburn.edu
Hangguan ShanZhejiang UniversityVerified email at zju.edu.cn
Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
Xiaodong CaiProfessor of Electrical and Computer Engineering, University of Miami, Coral Gables, FLVerified email at miami.edu
Rui ZhangCUHKSZ, SRIBD & National University of SingaporeVerified email at nus.edu.sg