Get my own profile
Public access
View all75 articles
153 articles
available
not available
Based on funding mandates
Co-authors
Wanlei ZhouProfessor, City University of Macau, MacaoVerified email at cityu.edu.mo
Song GuoFCAE, FIEEE, The Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Longxiang GaoDeakin UniversityVerified email at deakin.edu.au
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
wanchun douNanjing UniversityVerified email at nju.edu.cn
Keshav SoodLecturer in Cyber Security, Deakin University, Centre for Cyber Security Research & InnovationVerified email at deakin.edu.au
Jiaojiao JiangThe University of New South WalesVerified email at unsw.edu.au
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Yucheng DongProfessor of Management and Systems Sciences, Sichuan UniversityVerified email at scu.edu.cn
Hongke ZhangBeijing Jiaotong UniversityVerified email at bjtu.edu.cn
Follow
Professor Shui Yu
School of Computer Science, University of Technology Sydney, Australia
Verified email at uts.edu.au - Homepage