Get my own profile
Public access
View all51 articles
18 articles
available
not available
Based on funding mandates
Co-authors
Wenjing JiaUniversity of Technology SydneyVerified email at uts.edu.au
Priyadarsi NandaSenior Lecturer at University of Technology, SydneyVerified email at uts.edu.au
Qiang WuAssociate Professor, School of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
Mian Ahmad JanAbdul Wali Khan University MardanVerified email at awkum.edu.pk
Dr. Aruna JamdagniSchool of Computing and Mats, WesternSydney UniversityVerified email at westernsydney.edu.au
WEI-CHANG YEHChair Professor, National Tsing-Hua UniversityVerified email at ie.nthu.edu.tw
Kenneth Kin-Man LamThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Mohammed AmbusaidiUniversity of technology and applied sciencesVerified email at cas.edu.om
Changsheng XuProfessor, Institute of Automation, Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
Keren FuSichuan University, College of Computer ScienceVerified email at scu.edu.cn
suhuai luothe university of newcastleVerified email at newcastle.edu.au
Tao ZhouNanjing University of Science and Technology, IIAI, UNC, SJTUVerified email at njust.edu.cn
Vera Yuk Ying ChungSchool of Computer Science, University of Sydney, AustraliaVerified email at it.usyd.edu.au
Muhammad Abul HasanGreen University of BangladeshVerified email at cse.green.edu.bd
Massimo PiccardiProfessor, University of Technology SydneyVerified email at uts.edu.au
Chen GongProfessor@Nanjing University of Science and TechnologyVerified email at njust.edu.cn
Hamid R ArabniaProfessor Emeritus of Computer Science, University of GeorgiaVerified email at uga.edu