Get my own profile
Public access
View all57 articles
48 articles
available
not available
Based on funding mandates
Co-authors
- Wei NiFIEEE, AAIA Fellow, Senior Principal Scientist, Information Security & Privacy Group, CSIROVerified email at csiro.au
- Georgios B. GiannakisMcKnight Presidential Chair in ECE Dept., University of MinnesotaVerified email at umn.edu
- Tianyi ChenAssistant Professor, Rensselaer Polytechnic InstituteVerified email at rpi.edu
- XIAOJING CHENShanghai UniversityVerified email at shu.edu.cn
- Shuyan HuFudan UniversityVerified email at fudan.edu.cn
- Xiaojun YuanUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Feng WangGuangdong University of TechnologyVerified email at gdut.edu.cn
- Antonio G. MarquesProfessor of ECE, King Juan Carlos University (Universidad Rey Juan Carlos), MadridVerified email at urjc.es
- Qingwen LiuTongji UniversityVerified email at tongji.edu.cn
- Iain CollingsMacquarie UniversityVerified email at mq.edu.au
- Zhaoxi FangShaoxing UniversityVerified email at msu.edu
- Yi JiangFudan UniversityVerified email at fudan.edu.cn
- Yu ZhangAssistant Professor, University of California, Santa CruzVerified email at ucsc.edu
- Yongwei HuangSchool of Information Engineering, Guangdong University of TechnologyVerified email at gdut.edu.cn
- Hanqi ZhuangFAUVerified email at fau.edu
- Jitendra K TugnaitJames B Davis Professor of Electrical & Computer Engineering, Auburn UniversityVerified email at auburn.edu
- Hangguan ShanZhejiang UniversityVerified email at zju.edu.cn
- Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
- Xiaodong CaiProfessor of Electrical and Computer Engineering, University of Miami, Coral Gables, FLVerified email at miami.edu
- Rui ZhangCUHKSZ, SRIBD & National University of SingaporeVerified email at nus.edu.sg