Get my own profile
Public access
View all13 articles
17 articles
available
not available
Based on funding mandates
Co-authors
Cong WangDepartment of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityVerified email at monash.edu
CHENGJUN CAICity University of Hong KongVerified email at my.cityu.edu.hk
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Helei CuiSchool of Computer Science, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Dr. Jiantao ZhouAssociate Professor, Department of Computer and Information Science, University of MacauVerified email at umac.mo
Yansong GaoNanjing University of Science and TechnologyVerified email at njust.edu.cn
Alsharif (Sharif) AbuadbbaSenior Resreach Scientist - CSIRO's Data61Verified email at data61.csiro.au
Leo Yu ZHANGSchool of Info Technology, Deakin UniversityVerified email at deakin.edu.au