Get my own profile
Public access
View all1 article
9 articles
available
not available
Based on funding mandates
Co-authors
- jiajia liuProfessor, School of Cybersecurity, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
- Jiadai WangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Wen SunNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Hongzhi GuoNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Lin CaiProfessor, University of Victoria, IEEE/EIC/CAE Fellow, NSERC Steacie Fellow, RSC College MemberVerified email at ece.uvic.ca
- Jianping PanUniversity of VictoriaVerified email at uvic.ca
- Wu-Sheng LuProfessor Emeritus, University of Victoria, LFIEEEVerified email at ece.uvic.ca