Get my own profile
Public access
View all1 article
3 articles
available
not available
Based on funding mandates
Co-authors
Jie LiShanghai Jiao Tong University and University of TsukubaVerified email at u.tsukuba.ac.jp
Hitoshi AsaedaExecutive Researcher, Network System Research Institute, NICTVerified email at ieee.org
Hiroaki HaraiNICTVerified email at nict.go.jp
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Ved P. KafleResearch Manager, National Institute of Information and Communications TechnologyVerified email at nict.go.jp
Chen Hsiao-HwaNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Xiaoming FuProfessor of Computer Science, University of GoettingenVerified email at cs.uni-goettingen.de
Hisao KamedaProfessor Emeritus, Department of Computer Science, University of TsukubaVerified email at cs.tsukuba.ac.jp
Payam BarnaghiImperial College LondonVerified email at imperial.ac.uk
Yang XiaoProfessor, Department of Computer Science, The University of Alabama, Tuscaloosa, AL 35487-0290 USAVerified email at ieee.oeg
Kui WuComputer Science Dept., University of VictoriaVerified email at uvic.ca
Yuguang FangDistinguished Professor, Department of Electrical and Computer Engineering, University of FloridaVerified email at ece.ufl.edu
Hao YueAssistant Professor of Computer Science, San Francisco State UniversityVerified email at sfsu.edu
Frieder GanzAdobeVerified email at adobe.com
Nakjung ChoiBell LabsVerified email at nokia-bell-labs.com
Hajime TazakiSenior Researcher, IIJ Innovation InstituteVerified email at sfc.wide.ad.jp
Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
Klaus MoessnerProfessor in Communications Engineering, Technical University Chemnitz, and Professor in CognitiveVerified email at ieee.org
Yu Gu (谷雨)Professor, Hefei University of Technology, ChinaVerified email at hfut.edu.cn