Get my own profile
Public access
View all48 articles
54 articles
available
not available
Based on funding mandates
Co-authors
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Jianbing NiQueen's UniversityVerified email at queensu.ca
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Yi MuProfessorVerified email at cityu.mo
Xiaodong LinProfessor, IEEE Fellow, University of Guelph, CanadaVerified email at uoguelph.ca
Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Fagen LiProfessor of University of Electronic Science and Technology of China (UESTC)Verified email at uestc.edu.cn
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Distinguished Prof. Athanasios Vasilak...UiA,Norway, IAU,sa, Member of the European Academy of Sciences and ArtsVerified email at uia.no
Boyang WangUniversity of CincinnatiVerified email at uc.edu
Hui LiXidian UniversityVerified email at mail.xidian.edu.cn
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu