Get my own profile
Public access
View all24 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaVerified email at zhejianglab.com
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Yi MuProfessorVerified email at cityu.mo
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Xuechao YangCollege of ABLE&IT, Victoria UniversityVerified email at vu.edu.au
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Yinghui ZhangXUPT & SMUVerified email at smu.edu.sg
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Wencheng YangUniversity of Southern QueenslandVerified email at usq.edu.au
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Fuchun GuoUniversity of WollongongVerified email at uow.edu.au
Falko DresslerTechnische Universität BerlinVerified email at ccs-labs.org
Xiuzhen ChengSchool of Computer Science and Technology, Shandong UniversityVerified email at sdu.edu.cn
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Yangguang TianUniversity of SurreyVerified email at surrey.ac.uk