Get my own profile
Public access
View all34 articles
43 articles
available
not available
Based on funding mandates
Co-authors
- Bo ZengProfessor of Information Science, Chongqing Technology and Business University,Verified email at ctbu.edu.cn
- Ma, MindaProfessor, Chongqing University | Lawrence Berkeley National Laboratory & UC BerkeleyVerified email at lbl.gov
- Hongfang Lu (卢泓方)M. ASCE, Ph.D., Associate Professor, Southeast University, ChinaVerified email at seu.edu.cn
- Lifeng WuNanchang institute of technologyVerified email at nit.edu.cn
- Xinxing WuProfessor of Mathematics (Southwest Petroleum University)Verified email at swpu.edu.cn
- Xiwang XiangChongqing UniversityVerified email at cqu.edu.cn
- Wanpeng LiLecturer (Assistant Professor) in Cyber Security, University of AberdeenVerified email at live.rhul.ac.uk
- Lang YuChongqing UniversityVerified email at cqu.edu.cn
- Johan SuykensProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Pei Du(杜沛)School of Management, Xi’an Jiaotong University, Xian 710049, China