Get my own profile
Public access
View all113 articles
155 articles
available
not available
Based on funding mandates
Co-authors
Zhide ChenFujian Normal University;Fudan UniversityVerified email at fjnu.edu.cn
Sun-Yuan HsiehChair Professor of Department of Computer Science and Information Engineering, NationalVerified email at mail.ncku.edu.tw
Dajin WangMontclair State UniversityVerified email at mail.montclair.edu
hui linfujian normal universityVerified email at fjnu.edu.cn
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Jia HuUniversity of ExeterVerified email at exeter.ac.uk
Yi MuProfessorVerified email at cityu.mo
Fuchun GuoUniversity of WollongongVerified email at uow.edu.au
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Xiaofeng ChenProfessor, Xidian University, ChinaVerified email at xidian.edu.cn
Baoyu Zheng, IEEE Senior MemberProfessor, Nanjing University of Posts and Telecommunications, ChinaVerified email at njupt.edu.cn
Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
Jie LiIEEEF, Chair Professor in CS, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Jiguo LiProfessor of Computer Science, Fujian Normal UniversityVerified email at hhu.edu.cn
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Lanxiang Chenprofessor, Ph.D. supervisor, College of Computer and Cyber Security, Fujian Normal UniversityVerified email at fjnu.edu.cn
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Zhixiong Chen (陈智雄)Putian Univ. (Fujian, P. R. China) 莆田学院Verified email at ptu.edu.cn