Get my own profile
Public access
View all57 articles
24 articles
available
not available
Based on funding mandates
Co-authors
Yanchun ZhangGuangzhou University, Pengcheng Laboratory,Victoria UniversityVerified email at vu.edu.au
Jinli CaoLa Trobe UniversityVerified email at latrobe.edu.au
Jiuyong Li (李久永)Professor of Computer Science, University of South AustraliaVerified email at unisa.edu.au
Siuly SiulyResearch Fellow, Victoria University, AustraliaVerified email at vu.edu.au
Ji ZhangThe University Southern QueenslandVerified email at usq.edu.au
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Quan Z. (Michael) ShengFull Professor, School of Computing, Macquarie University, Sydney, AustraliaVerified email at mq.edu.au
Xiaohui TaoUniversity of Southern QueenslandVerified email at usq.edu.au
Rui ZhouSwinburne University of Technology, AustraliaVerified email at swin.edu.au
Jiangang MaFederation University, AustraliaVerified email at federation.edu.au
Xiaoxia Yin; Xiao-Xia YinDr of Electronic Engineering, The Univeristy of AdelaideVerified email at vu.edu.au
jeffrey soarUniversity of Southern QueenslandVerified email at usq.edu.au
Xiuzhen (Jenny) ZhangProfessor, School of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
Yongzhi WangPark UniversityVerified email at park.edu
Georgios KambourakisProfessor, Dept. of Information and Communication Systems Eng., University of the AegeanVerified email at aegean.gr
Yuanyu ZhangXidian UniversityVerified email at xidian.edu.cn
Traian Marius TrutaProfessor of Computer Science, Northern Kentucky UniversityVerified email at nku.edu
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Zonghua Zhang (张宗华)Huawei Paris Research Center; IMT Nord EuropeVerified email at imt-lille-douai.fr
Stijn DekeyserAssociate Professor of Computing, University of Southern QueenslandVerified email at usq.edu.au