Get my own profile
Public access
View all7 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Junlong ZhouNanjing University of Science and TechnologyVerified email at njust.edu.cn
- Gongxuan ZhangNanjing University of Science and TechnologyVerified email at njust.edu.cn
- Jin SunNanjing University of Science and TechnologyVerified email at njust.edu.cn
- Tongquan weiEast China Normal UniversityVerified email at cs.ecnu.edu.cn
- Shiyan HuProfessor and Chair in Cyber-Physical System Security, University of SouthamptonVerified email at soton.ac.uk
- Mingsong ChenSoftware Engineering Institute, East China Normal UniversityVerified email at sei.ecnu.edu.cn
- Peijin CongNanjing University of Science and TechnologyVerified email at njust.edu.cn
- Kun CaoJinan UniversityVerified email at jnu.edu.cn
- Keqin Li (李克勤)SUNY Distinguished Professor, National Distinguished Professor, MAE, AAAS/IEEE/AAIA/ACIS/AIIA FellowVerified email at newpaltz.edu
- Xiaobo Sharon HuUniversity of Notre Dame, Department of Computer Science and EngineeringVerified email at nd.edu