Get my own profile
Public access
View all119 articles
35 articles
available
not available
Based on funding mandates
Co-authors
Xiaojing HuangProfessor of ICT, University of Technology SydneyVerified email at uts.edu.au
Pei-Yuan QinUniversity of Technology, SydneyVerified email at uts.edu.au
Jian (Andrew) ZhangProf, University of Technology SydneyVerified email at uts.edu.au
CAN DINGUniversity of Technology, Sydney (UTS)Verified email at students.mq.edu.au
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
Shu-Lin ChenUniversity of Technology SydneyVerified email at uts.edu.au
Richard W. ZiolkowskiDistinguished Professor, University of Technology SydneyVerified email at ece.arizona.edu
Wei NiPrincipal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
He ZhuGlobal Big Data Technologies Centre, University of Technology SydneyVerified email at uts.edu.au
Jia DuCSIROVerified email at csiro.au
Trevor S. BirdAntengenuityVerified email at ieee.org
Kai WuPostdoc Research Associate, GBDTC, SEDE, FEIT, UTSVerified email at uts.edu.au
Hai-Han SunNanyang Technological UniversityVerified email at ntu.edu.sg
Jose Luis Gomez TorneroTechnical University of CartagenaVerified email at upct.es
Val DyadyukCSIROVerified email at csiro.au
Debabrata Kumar KarmokarUniversity of South AustraliaVerified email at ieee.org
Xu WangSchool of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
John BuntonCSIROVerified email at csiro.au
Robert HeathLampe Distinguished Professor, North Carolina State UniversityVerified email at ncsu.edu
Ting zhangResearch fellow at UTSVerified email at uts.edu.au
Follow