Get my own profile
Public access
View all10 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Ying Jun (Angela) ZhangThe Chinese University of Hong Kong; Fellow of IEEEVerified email at ie.cuhk.edu.hk
- Xiaojun YuanUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Wenjing YanThe Hong Kong University of Science and Technology (HKUST)Verified email at connect.ust.hk
- Zehong LinHong Kong University of Science and TechnologyVerified email at ust.hk
- Yuanming ShiProfessor, ShanghaiTech UniversityVerified email at shanghaitech.edu.cn
- Anna ScaglioneProfessor of Electrical and Computer Engineering, Cornell UniversityVerified email at cornell.edu
- Zhen-Qing HeSichuan UniversityVerified email at scu.edu.cn
- Hoi-To WaiAssistant Professor, The Chinese University of Hong KongVerified email at se.cuhk.edu.hk
- Jia YanThe Hong Kong University of Science and Technology (Guangzhou)Verified email at hkust-gz.edu.cn
- Andrew CampbellCornell UniversityVerified email at cornell.edu
- Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisVerified email at lbl.gov