Get my own profile
Public access
View all19 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Yingjiu LiRipple Professor, Computer and Information Science Department, University of OregonVerified email at uoregon.edu
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Yi MuProfessor, City University of Macau, MacaoVerified email at cityu.mo
Man Ho AuThe University of Hong KongVerified email at cs.hku.hk
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaVerified email at zhejianglab.com
Xuechao Yang (PhD)School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Joseph K. LiuAssociate Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Jian WengProfessor, Department of Computer Science, Jinan UniversityVerified email at jnu.edu.cn
Fuchun GuoUniversity of WollongongVerified email at uow.edu.au
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Andrei KelarevRMIT UniversityVerified email at rmit.edu.au
Willy SusiloDistinguished Professor of Computer Science and IEEE Fellow, University of WollongongVerified email at uow.edu.au
Yinghui ZhangXUPT & SMUVerified email at smu.edu.sg
Tsz Hon YuenThe University of Hong KongVerified email at cs.hku.hk
Yangguang TianUniversity of SurreyVerified email at surrey.ac.uk
Baodong Qin (秦宝东)Xi'an University of Posts and Telecommunications