Get my own profile
Public access
View all14 articles
21 articles
available
not available
Based on funding mandates
Co-authors
- Yiu-ming Cheung, PhD, Chair Profess...Department of Computer Science, Hong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk
- Shaohua TANGProfessor of Computer Science, South China University of TechnologyVerified email at scut.edu.cn
- Yun-Qing ShiProfessor of Electrical and Computer Engineering, New Jersey Institute of Technology Verified email at njit.edu
- Jiwu HuangShenzhen UniversityVerified email at szu.edu.cn
- Jean-luc DugelayProfessor, Imaging Security, EURECOMVerified email at eurecom.fr
- Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
- Xinpeng Zhang (张新鹏)Professor, Shanghai University/Fudan UniversityVerified email at shu.edu.cn
- Xiaolong LIInstitute of Information Science, Beijing Jiaotong UniversityVerified email at bjtu.edu.cn
- Bowen Zhao (赵搏文)Xidian UniversityVerified email at smu.edu.sg
- Xinglin ZhangProfessor, South China University of TechnologyVerified email at scut.edu.cn
- Junhui HeSouth China University of TechnologyVerified email at scut.edu.cn
- Xingfu YanSouth China Normal UniversityVerified email at m.scnu.edu.cn
- Benjamin TurnbullUniversity of New South WalesVerified email at unsw.edu.au
- Xiaofeng ChenProfessor, Xidian University, ChinaVerified email at xidian.edu.cn
- Jin Li 李进Professor @Guangzhou UniversityVerified email at gzhu.edu.cn
- Fangguo ZhangSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
- Jane You, Professorthe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk