Get my own profile
Public access
View all16 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Matthew R. McKayProfessor, ARC Future Fellow, University of MelbourneVerified email at unimelb.edu.au
Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Maged ElkashlanAssociate Professor, Queen Mary University of LondonVerified email at qmul.ac.uk
Stephen HanlyProfessor of EngineeringVerified email at mq.edu.au
Jinhong YuanProfessor of Electrical Engineering and Telecommunications, University of New South WalesVerified email at unsw.edu.au
Phil YeohUniversity of the Sunshine CoastVerified email at usc.edu.au
Zhuo ChenCSIRO, AustraliaVerified email at csiro.au
Hajime SuzukiCSIROVerified email at csiro.au
I. Vaughan L. ClarksonSchool of Electrical Engineering & Computer Science, Queensland University of TechnologyVerified email at qut.edu.au
Raymond LouieUniversity of New South WalesVerified email at unsw.edu.au
Mark HedleyCSIRO Data61Verified email at csiro.au
Philip WhitingMacquarie University, Dept. of Engineering, North Ryde, NSW AustraliaVerified email at mq.edu.au
Linda DavisAssociate Professor, Institute for Telecommunications Research, University of South AustraliaVerified email at unisa.edu.au
Robert HeathLampe Distinguished Professor, North Carolina State UniversityVerified email at ncsu.edu
Min LiZJU100 Young Professor at Zhejiang UniversityVerified email at zju.edu.cn
Michael HonigProfessor of Electrical Engineering and Computer Science, Northwestern UniversityVerified email at eecs.northwestern.edu
Nan YangAustralian National UniversityVerified email at anu.edu.au
Chang Kyung SungThales AustraliaVerified email at thalesgroup.com.au
Antonio ForenzaArtemis NetworksVerified email at artemis.com
Jamie EvansUniversity of MelbourneVerified email at unimelb.edu.au