Crea il mio profilo
Accesso pubblico
Visualizza tutto13 articoli
20 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yiu-ming Cheung, PhD, Chair Profess...Department of Computer Science, Hong Kong Baptist UniversityEmail verificata su comp.hkbu.edu.hk
- Shaohua TANGProfessor of Computer Science, South China University of TechnologyEmail verificata su scut.edu.cn
- Yun-Qing ShiProfessor of Electrical and Computer Engineering, New Jersey Institute of Technology Email verificata su njit.edu
- Jiwu HuangShenzhen UniversityEmail verificata su szu.edu.cn
- Jean-luc DugelayProfessor, Imaging Security, EURECOMEmail verificata su eurecom.fr
- Prof. Jiankun HuUniversity of New South Wales, CanberraEmail verificata su adfa.edu.au
- Xinpeng Zhang (张新鹏)Professor, Shanghai University/Fudan UniversityEmail verificata su shu.edu.cn
- Xiaolong LIInstitute of Information Science, Beijing Jiaotong UniversityEmail verificata su bjtu.edu.cn
- Bowen Zhao (赵搏文)Xidian UniversityEmail verificata su smu.edu.sg
- Xinglin ZhangProfessor, South China University of TechnologyEmail verificata su scut.edu.cn
- Junhui HeSouth China University of TechnologyEmail verificata su scut.edu.cn
- Xingfu Yan (闫幸福)South China Normal UniversityEmail verificata su m.scnu.edu.cn
- Benjamin TurnbullUniversity of New South WalesEmail verificata su unsw.edu.au
- Xiaofeng ChenProfessor, Xidian University, ChinaEmail verificata su xidian.edu.cn
- Jin Li 李进Professor @Guangzhou UniversityEmail verificata su gzhu.edu.cn
- Fangguo ZhangSun Yat-sen UniversityEmail verificata su mail.sysu.edu.cn
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyEmail verificata su swin.edu.au
- Jane You, Professorthe Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk