Get my own profile
Public access
View all19 articles
24 articles
available
not available
Based on funding mandates
Co-authors
Wei NiInformation Privacy and Security Group, CSIROVerified email at csiro.au
Eduardo TovarProfessor, ISEP, Polytechnic Institute of Porto, Researcher CISTERVerified email at isep.ipp.pt
salil kanhereProfessor, UNSW Sydney, AustraliaVerified email at unsw.edu.au
Prof. Sanjay JhaProfessor, School of Computer Science and Engineering, University of New South WalesVerified email at cse.unsw.edu.au
Chau YuenIEEE Fellow, Singapore University of Technology and DesignVerified email at sutd.edu.sg
Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Verified email at mbzuai.ac.ae
yousef emamiFEUP, University of PortoVerified email at fe.up.pt
Xin WangFudan UniversityVerified email at fudan.edu.cn
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
Mehran AbolhasanAssociate Professor, University of Technology SydneyVerified email at uts.edu.au
Lingjie DuanAssociate Professor, Singapore University of Technology and DesignVerified email at sutd.edu.sg
Abbas Jamalipour, Fellow IEEE, Fello...Professor of Ubiquitous Mobile Networking, The University of SydneyVerified email at ieee.org
Jianwei NiuBeihang UniversityVerified email at buaa.edu.cn
Tanmay ChaturvediGraduate Student at the University of Colorado, Boulder, USAVerified email at colorado.edu
Bo WeiAssistant Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Brano KusyAutonomous Systems, CSIRO, AustraliaVerified email at csiro.au
Raja JurdakProfessor, Queensland University of Technology (QUT), AustraliaVerified email at qut.edu.au
Aleksandar IgnjatovicUniversity of New South WalesVerified email at cse.unsw.edu.au
Nadeem AhmedComputer Science and Engineering (CSE), UNSW / Cyber Security CRCVerified email at unsw.edu.au
Pei ZhangUniversity of Michigan, Ann ArborVerified email at umich.edu