Get my own profile
Public access
View all1 article
6 articles
available
not available
Based on funding mandates
Co-authors
- Nei Kato(IEEE Fellow, IEICE Fellow)Professor and Dean, Graduate School of Information Sciences, Tohoku University, JapanVerified email at it.is.tohoku.ac.jp
- fengxiao tangtohoku university, central south universityVerified email at it.is.tohoku.ac.jp
- Zubair Md FadlullahAssociate Professor, Department of Computer Science, Western UniversityVerified email at ieee.org
- jiajia liuProfessor, School of Cybersecurity, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Takeru InoueNTT Network Innovation Labs.Verified email at ieee.org
- Osamu AkashiNational Institute of InformaticsVerified email at nii.ac.jp
- Kimihiro MizutaniKindai UniversityVerified email at info.kindai.ac.jp
- Yuichi KawamotoTohoku UniversityVerified email at ieee.org
- Yishi ZhuTohoku UniversityVerified email at it.is.tohoku.ac.jp
- Fumie OnoNational Institute of Information and Communications Technology, JAPANVerified email at nict.go.jp
- Jiadai WangNorthwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Follow
Bomin Mao
School of Cybersecurity, Northwestern Polytechnical University
Verified email at nwpu.edu.cn