Get my own profile
Public access
View all64 articles
69 articles
available
not available
Based on funding mandates
Co-authors
Xiaofeng TaoBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Wei NiPrincipal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Mikko ValkamaTampere University, FinlandVerified email at tuni.fi
YANZHAO HOUBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Xueqing HuangNew York Institute of TechnologyVerified email at nyit.edu
Kwang-cheng ChenProfessor, Department of Electrical Engineering, University of South Florida; IEEE FellowVerified email at usf.edu
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
Riku JanttiAalto UniversityVerified email at aalto.fi
Martin HaenggiFreimann Professor of Electrical Engineering and Prof. of Applied Math., University of Notre DameVerified email at nd.edu
Mulugeta K. FikaduTampere University of TechnologyVerified email at tut.fi
Bing LuoAssistant Professor of Data and Computational Science, Duke Kunshan UniversityVerified email at duke.edu
Alexis DowhuszkoAalto UniversityVerified email at aalto.fi
Xinlei YuBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Prof. Y. Jay GuoUniversity of Technology Sydney, AustraliaVerified email at uts.edu.au
Na LiBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Follow
Qimei Cui
Professor , School of Information and Communication Engineering ,Beijing University of Posts and
Verified email at bupt.edu.cn