Get my own profile
Co-authors
Wanlei ZhouProfessor and Head of School of Computer Science in University of Technology SydneyVerified email at uts.edu.au
Jun ZhangSwinburne University of TechnologyVerified email at swin.edu.au
Xinyi Huang(黄欣沂)School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, ChinaVerified email at fjnu.edu.cn
Yu WangGuangzhou UniversityVerified email at gzhu.edu.cn
Chao ChenSwinburne University of TechnologyVerified email at swin.edu.au
Silvio CesareUNSW CanberraVerified email at adfa.edu.au
Xiaofeng ChenProfessor, Xidian University, ChinaVerified email at xidian.edu.cn
Professor Shui YuSchool of Software, University of Technology Sydney, AustraliaVerified email at uts.edu.au
Jiaojiao JiangRMIT UniversityVerified email at rmit.edu.au
Jin Li 李进Professor @Guangzhou UniversityVerified email at gzhu.edu.cn
Ashley ChonkaI.T Security Researcher and DeveloperVerified email at internode.on.net
Wazir Zada KhanFaculity of CS & IS, University of JazanVerified email at jazanu.edu.sa
Lei PanSenior Lecturer in Cyber Security, School of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Joseph K. LiuAssociate Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Li Xu(许力)Fujian Normal UniversityVerified email at fjnu.edu.cn
Jian ShenNanjing University of Information Science and TechnologyVerified email at nuist.edu.cn
Shigang LiuSwinburne University of TechnologyVerified email at swin.edu.au
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Weijia JiaChair Professor, University of MacauVerified email at umac.mo
Yang Xiang
Verified email at swin.edu.au - Homepage