Get my own profile
Public access
View all77 articles
87 articles
available
not available
Based on funding mandates
Co-authors
- Xiaofeng TaoBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
- Wei NiFIEEE, AAIA Fellow, Principal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
- YANZHAO HOUBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
- Mikko ValkamaTampere University, FinlandVerified email at tuni.fi
- Xueqing HuangNew York Institute of TechnologyVerified email at nyit.edu
- Kwang-cheng ChenProfessor, Department of Electrical Engineering, University of South Florida; IEEE FellowVerified email at usf.edu
- Martin HaenggiFreimann Professor of Electrical Engineering and Prof. of Applied Math., University of Notre DameVerified email at nd.edu
- Riku JanttiAalto UniversityVerified email at aalto.fi
- Mulugeta K. FikaduTampere University of TechnologyVerified email at tut.fi
- Bing LuoAssistant Professor of Data and Computational Science, Duke Kunshan UniversityVerified email at duke.edu
- Xinlei YuBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
- Alexis DowhuszkoAalto UniversityVerified email at aalto.fi
- Prof. Y. Jay GuoUniversity of Technology Sydney, AustraliaVerified email at uts.edu.au
- Na LiBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Follow
Qimei Cui
Professor , School of Information and Communication Engineering ,Beijing University of Posts and
Verified email at bupt.edu.cn