Get my own profile
Public access
View all61 articles
96 articles
available
not available
Based on funding mandates
Co-authors
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Wenying WenJiangxi University of Finance and EconomicsVerified email at jxufe.edu.cn
chai xiuli(柴秀丽)School of Computer and Information Engineering,Henan UniversityVerified email at henu.edu.cn
Leo Yu ZHANGSnr. Lecturer, School of ICT, Griffith UniversityVerified email at griffith.edu.au
Junxin ChenProfessor, Dalian University of TechnologyVerified email at ieee.org
Rushi LanGuilin University of Electronic TechnologyVerified email at guet.edu.cn
Jiantao ZhouProfessor, Department of Computer and Information Science, University of MacauVerified email at umac.mo
Youwen ZhuNanjing University of Aeronautics and AstronauticsVerified email at imi.kyushu-u.ac.jp
Yuming FangJiangxi University of Finance and EconomicsVerified email at ntu.edu.sg
Zhongyun HuaProfessor, Harbin Institute of Technology, ShenzhenVerified email at hit.edu.cn
Xiaochun CaoSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Tao XiangProfessor of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Zhihua XiaJinan UniversityVerified email at jnu.edu.cn
Xinpeng Zhang (张新鹏)Professor, Shanghai University/Fudan UniversityVerified email at shu.edu.cn
Follow![Yushu Zhang (张玉书)](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=KTrrZ6IAAAAJ&citpid=5)
Yushu Zhang (张玉书)
College of Computer Science, Nanjing University of Aeronautics and Astronautics
Verified email at nuaa.edu.cn - Homepage