Get my own profile
Public access
View all60 articles
22 articles
available
not available
Based on funding mandates
Co-authors
- Wenjing JiaUniversity of Technology SydneyVerified email at uts.edu.au
- Priyadarsi NandaSenior Lecturer at University of Technology, SydneyVerified email at uts.edu.au
- Qiang WuAssociate Professor, School of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
- Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
- Mian Ahmad JanAssistant Professor, College of Computing and Informatics, University of SharjahVerified email at sharjah.ac.ae
- Dr. Aruna JamdagniSchool of Computing and Mats, WesternSydney UniversityVerified email at westernsydney.edu.au
- Kenneth Kin-Man LamThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
- WEI-CHANG YEHChair Professor, National Tsing-Hua UniversityVerified email at ie.nthu.edu.tw
- Changsheng XuProfessor, Institute of Automation, Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
- suhuai luothe university of newcastleVerified email at newcastle.edu.au
- Keren FuSichuan University, College of Computer ScienceVerified email at scu.edu.cn
- Tao ZhouNanjing University of Science and Technology, IIAI, UNC, SJTUVerified email at njust.edu.cn
- Vera Yuk Ying ChungSchool of Computer Science, University of Sydney, AustraliaVerified email at it.usyd.edu.au
- Muhammad Abul HasanGreen University of BangladeshVerified email at cse.green.edu.bd
- Massimo PiccardiProfessor, University of Technology SydneyVerified email at uts.edu.au
- Chen GongProfessor@Nanjing University of Science and TechnologyVerified email at njust.edu.cn
- Hamid R ArabniaProfessor Emeritus of Computer Science, University of GeorgiaVerified email at uga.edu