Get my own profile
Public access
View all71 articles
80 articles
available
not available
Based on funding mandates
Co-authors
Xiaofeng TaoBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
YANZHAO HOUBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Mikko ValkamaTampere University, FinlandVerified email at tuni.fi
Xueqing HuangNew York Institute of TechnologyVerified email at nyit.edu
Kwang-cheng ChenProfessor, Department of Electrical Engineering, University of South Florida; IEEE FellowVerified email at usf.edu
Martin HaenggiFreimann Professor of Electrical Engineering and Prof. of Applied Math., University of Notre DameVerified email at nd.edu
Riku JanttiAalto UniversityVerified email at aalto.fi
Mulugeta K. FikaduTampere University of TechnologyVerified email at tut.fi
Bing LuoAssistant Professor of Data and Computational Science, Duke Kunshan UniversityVerified email at duke.edu
Xinlei YuBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Alexis DowhuszkoAalto UniversityVerified email at aalto.fi
Prof. Y. Jay GuoUniversity of Technology Sydney, AustraliaVerified email at uts.edu.au
Na LiBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Follow
Qimei Cui
Professor , School of Information and Communication Engineering ,Beijing University of Posts and
Verified email at bupt.edu.cn