Get my own profile
Co-authors
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
Joonsang BaekSenior Lecturer, University of Wollongong, AustraliaVerified email at uow.edu.au
Josef PieprzykCSIRO Data61Verified email at csiro.au
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
Chandana GamageSenior Lecturer, University of Moratuwa, Sri LankaVerified email at cse.mrt.ac.lk
Yongge WangUNC CharlotteVerified email at uncc.edu
Jun HanProfessor of Software Engineering, Swinburne University of Technology, AustraliaVerified email at swin.edu.au
Xintao WuUniversity of ArkansasVerified email at uark.edu
Miodrag MihaljevicMathematical Institute of the Serbian Academy of Sciences and ArtsVerified email at mi.sanu.ac.rs
Khaled KhanQatar UniversityVerified email at qu.edu.qa
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Laurence BullLeidos AustraliaVerified email at leidos.com
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Yi MuProfessorVerified email at fjnu.edu.cn
Moti YungResearch Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Luke O'ConnorKPMGVerified email at kpmg.com.au
Suzuki JoeOsaka UnivVerified email at math.sci.osaka-u.ac.jp
Xiaohu TangSouthwest Jiaotong UniversotyVerified email at swjtu.edu.cn
Seungjoo (Gabriel) KimProfessor at the School of Cybersecurity in Korea UniversityVerified email at korea.ac.kr
Gautam Singaraju-Verified email at singaraju.com
Yuliang Zheng
Professor & Chair, Computer Science, University of Alabama at Birmingham
Verified email at uab.edu - Homepage