Get my own profile
Public access
View all34 articles
18 articles
available
not available
Based on funding mandates
Co-authors
jianyong chenShenzhen universityVerified email at szu.edu.cn
Jianwen XiangWuhan University of TechnologyVerified email at whut.edu.cn
ABDELGHANI DAHOUUniversity Ahmed Draia - AdrarVerified email at univ-adrar.dz
Guodong YeGuangdong Ocean University, ChinaVerified email at gdou.edu.cn
Lm ChengAssociate Professor of Electronic Engineeing, Cit University of Hong KongVerified email at cityu.edu.hk
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Dongdong ZhaoWuhan University of TechnologyVerified email at whut.edu.cn
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Dr. Mohamed Abd ElazizAssociate Professor, Galala UniversityVerified email at Gu.edu.eg
Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
Xing TangWuhan University of TechnologyVerified email at my.cityu.edu.hk
Prof Anthony TS HoProfessor of Multimedia SecurityVerified email at surrey.ac.uk
qiuzhen linShenzhen UniversityVerified email at szu.edu.cn
Yoon-Ho ChoiProfessor of Computer Science and Engineering, Pusan National UniversityVerified email at pusan.ac.kr
Zhilong WangThe Pennsylvania State UniversityVerified email at psu.edu
Xinrong WuHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Manos PanaousisProfessor of Cyber Security, Centre for Sustainable Cyber Security (CS2), University of GreenwichVerified email at greenwich.ac.uk
QIAO YANShenzhen universityVerified email at szu.edu.cn
Fei ChenShenzhen UniversityVerified email at szu.edu.cn
F. Richard YuFIEEE, FCAE, MAE, Carleton U., Ottawa, CanadaVerified email at carleton.ca