Get my own profile
Public access
View all17 articles
35 articles
available
not available
Based on funding mandates
Co-authors
- Yong FengSwinburne University of Technology, AustraliaVerified email at swin.edu.au
- Xinghuo YuFAA, HonFIEAust, FIEEE, Distinguished Professor @ RMIT UniversityVerified email at rmit.edu.au
- Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Xuechao YangSchool of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
- Jinhu LuProfessor of Beihang UniversityVerified email at iss.ac.cn
- Ron van SchyndelAcademic at RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au
- Guanrong ChenCity University of Hong KongVerified email at cityu.edu.hk
- Rebecca Jing YangRMIT UniversityVerified email at rmit.edu.au
- Xuemei ZhengProfessor, Harbin Institute of Technology, ChinaVerified email at hit.edu.cn
- Tohari AhmadDepartment of Informatics, Institut Teknologi Sepuluh NopemberVerified email at if.its.ac.id
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Yi (Alice) WangDongguan University of TechnologyVerified email at ieee.org
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
- Ligang HeReader of Computer Science, University of Warwick, United KingdomVerified email at warwick.ac.uk
- Minghao Zhou (周铭浩)Harbin Institute of Technology, China; RMIT University, Australia; HUST, China
Follow
Fengling Han
School of Computing Technologies, RMIT University, Australia
Verified email at rmit.edu.au - Homepage