Get my own profile
Public access
View all62 articles
21 articles
available
not available
Based on funding mandates
Co-authors
Wenjing JiaUniversity of Technology SydneyVerified email at uts.edu.au
Priyadarsi NandaSenior Lecturer at University of Technology, SydneyVerified email at uts.edu.au
Qiang WuAssociate Professor, School of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
Mian Ahmad JanAssistant Professor, College of Computing and Informatics, University of SharjahVerified email at sharjah.ac.ae
Dr. Aruna JamdagniSchool of Computing and Mats, WesternSydney UniversityVerified email at westernsydney.edu.au
WEI-CHANG YEHChair Professor, National Tsing-Hua UniversityVerified email at ie.nthu.edu.tw
Kenneth Kin-Man LamThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Changsheng XuProfessor, Institute of Automation, Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
suhuai luothe university of newcastleVerified email at newcastle.edu.au
Keren FuSichuan University, College of Computer ScienceVerified email at scu.edu.cn
Tao ZhouNanjing University of Science and Technology, IIAI, UNC, SJTUVerified email at njust.edu.cn
Vera Yuk Ying ChungSchool of Computer Science, University of Sydney, AustraliaVerified email at it.usyd.edu.au
Muhammad Abul HasanGreen University of BangladeshVerified email at cse.green.edu.bd
Massimo PiccardiProfessor, University of Technology SydneyVerified email at uts.edu.au
Chen GongProfessorVerified email at sjtu.edu.cn
Hamid R ArabniaProfessor Emeritus of Computer Science, University of GeorgiaVerified email at uga.edu