Get my own profile
Public access
View all4 articles
11 articles
available
not available
Based on funding mandates
Co-authors
Cong WangDepartment of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityVerified email at monash.edu
Bin GuoProfessor of Computer Science, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Yifeng ZhengHarbin Institute of TechnologyVerified email at hit.edu.cn
Zhiwen Yu (於志文)Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Yuefeng DuResearcher, City University of Hong KongVerified email at cityu.edu.hk
Xinyu WangCity University of Hong KongVerified email at my.cityu.edu.hk
Yajin ZhouZhejiang UniversityVerified email at zju.edu.cn
Kui RenProfessor, Zhejiang University, ACM Fellow, IEEE FellowVerified email at zju.edu.cn
Yu HuaProfessor, Huazhong University of Science and TechnologyVerified email at hust.edu.cn
Zhan QinResearcher, Zhejiang University
Qian Wang (王骞)IEEE Fellow, School of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
Follow
Helei Cui
School of Computer Science, Northwestern Polytechnical University
Verified email at nwpu.edu.cn - Homepage