Get my own profile
Public access
View all26 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaVerified email at zhejianglab.com
- Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
- Yi MuProfessorVerified email at cityu.mo
- Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Xuechao YangSchool of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Wencheng YangUniversity of Southern QueenslandVerified email at usq.edu.au
- Yinghui ZhangXUPT & SMUVerified email at smu.edu.sg
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Falko DresslerTechnische Universität BerlinVerified email at ccs-labs.org
- Xiuzhen ChengSchool of Computer Science and Technology, Shandong UniversityVerified email at sdu.edu.cn
- Atsuko MiyajiOsaka UniversityVerified email at comm.eng.osaka-u.ac.jp
- Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
- Yangguang TianUniversity of SurreyVerified email at surrey.ac.uk
- Fuchun GuoUniversity of WollongongVerified email at uow.edu.au