Get my own profile
Public access
View all6 articles
22 articles
available
not available
Based on funding mandates
Co-authors
- HyungSeok KIMKONKUK university, KoreaVerified email at konkuk.ac.kr
- Huawei TuLa Trobe UniversityVerified email at latrobe.edu.au
- Zitao LiuJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Hai-Ning LiangThe Hong Kong University of Science and Technology (Guangzhou)Verified email at hkust-gz.edu.cn
- Byungmoon KimAdobeVerified email at adobe.com
- Henry B.L. DuhProfessor & Director, Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
- Yue LiXi'an Jiaotong-Liverpool UniversityVerified email at xjtlu.edu.cn
- Teng HanInstitute of Software, Chinese Academy of SciencesVerified email at iscas.ac.cn
- Shihui GuoSchool of Informatics, Xiamen UniversityVerified email at xmu.edu.cn
- Jingbo ZhaoAssociate Professor at China Agricultural UniversityVerified email at cau.edu.cn
- Kim Jee InProfessor of Software, Konkuk UniversityVerified email at konkuk.ac.kr
Follow