Get my own profile
Public access
View all20 articles
26 articles
available
not available
Based on funding mandates
Co-authors
Zhijie Jerry ShiUniversity of ConnecticutVerified email at uconn.edu
Kui RenProfessor, Zhejiang University, ACM Fellow, IEEE FellowVerified email at zju.edu.cn
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Ee-Chien ChangNational University of SingaporeVerified email at comp.nus.edu.sg
Jianting NingSingapore Management UniversityVerified email at smu.edu.sg
Zhe LiuProfessor, Nanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Yuqi ChenAssistant Professor, Shanghaitech UniversityVerified email at shanghaitech.edu.cn
Christopher M. PoskittSingapore Management University (SMU)Verified email at smu.edu.sg
Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
Yajin ZhouZhejiang UniversityVerified email at zju.edu.cn
Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
Zhuotao LiuTsinghua UniversityVerified email at tsinghua.edu.cn