Get my own profile
Public access
View all14 articles
19 articles
available
not available
Based on funding mandates
Co-authors
Jie LiProfessor in CS, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Hitoshi AsaedaDirector, Network Architecture Laboratory, NICTVerified email at ieee.org
Hiroaki HaraiNICTVerified email at nict.go.jp
Ved P. KafleResearch Manager, National Institute of Information and Communications TechnologyVerified email at nict.go.jp
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Xiaoming FuProfessor of Computer Science, University of GoettingenVerified email at cs.uni-goettingen.de
Chen Hsiao-HwaNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Hisao KamedaProfessor Emeritus, Department of Computer Science, University of TsukubaVerified email at cs.tsukuba.ac.jp
Payam BarnaghiImperial College LondonVerified email at imperial.ac.uk
Yuguang "Michael" FangChair Professor, Department of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Hao YueAssistant Professor of Computer Science, San Francisco State UniversityVerified email at sfsu.edu
Kui WuComputer Science Dept., University of VictoriaVerified email at uvic.ca
Frieder GanzAdobeVerified email at adobe.com
Nakjung ChoiBell LabsVerified email at nokia-bell-labs.com
Hajime TazakiSenior Researcher, IIJ Research LaboratoryVerified email at sfc.wide.ad.jp
Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
Klaus MoessnerProfessor in Communications Engineering, Technical University Chemnitz, and Professor in CognitiveVerified email at ieee.org
Yu Gu (谷雨)Professor, University of Electronic Science and Technology of China, ChinaVerified email at uestc.edu.cn
Follow