Get my own profile
Public access
View all20 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Yi MuProfessorVerified email at cityu.mo
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaVerified email at zhejianglab.com
Xuechao Yang (PhD)School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Xinyi Huang(黄欣沂)Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and TechnologyVerified email at ust.hk
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Yinghui ZhangXUPT & SMUVerified email at smu.edu.sg
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Fuchun GuoUniversity of WollongongVerified email at uow.edu.au
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Andrei KelarevRMIT UniversityVerified email at rmit.edu.au
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Falko DresslerTechnische Universität BerlinVerified email at ccs-labs.org
Yangguang TianUniversity of SurreyVerified email at surrey.ac.uk