Get my own profile
Public access
View all68 articles
98 articles
available
not available
Based on funding mandates
Co-authors
- Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
- Wenying WenJiangxi University of Finance and EconomicsVerified email at jxufe.edu.cn
- chai xiuli(柴秀丽)School of Computer and Information Engineering,Henan UniversityVerified email at henu.edu.cn
- Leo Yu ZHANGSnr. Lecturer, School of ICT, Griffith UniversityVerified email at griffith.edu.au
- Junxin ChenProfessor, Dalian University of TechnologyVerified email at ieee.org
- Rushi LanGuilin University of Electronic TechnologyVerified email at guet.edu.cn
- Jiantao ZhouProfessor, Department of Computer and Information Science, University of MacauVerified email at umac.mo
- Zhongyun HuaProfessor, Harbin Institute of Technology, ShenzhenVerified email at hit.edu.cn
- Yuming FangJiangxi University of Finance and EconomicsVerified email at ntu.edu.sg
- Youwen ZhuNanjing University of Aeronautics and AstronauticsVerified email at imi.kyushu-u.ac.jp
- Xiaochun CaoSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
- Tao XiangProfessor of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
- Zhihua XiaJinan UniversityVerified email at jnu.edu.cn
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Xinpeng Zhang (张新鹏)Professor, Shanghai University/Fudan UniversityVerified email at shu.edu.cn
Follow
Yushu Zhang (张玉书)
College of Computer Science, Nanjing University of Aeronautics and Astronautics
Verified email at nuaa.edu.cn - Homepage