Get my own profile
Public access
View all27 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaVerified email at zhejianglab.com
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Yi MuProfessorVerified email at cityu.mo
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Xuechao YangSchool of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Wencheng YangUniversity of Southern QueenslandVerified email at usq.edu.au
Yinghui ZhangXUPT & SMUVerified email at smu.edu.sg
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Atsuko MiyajiOsaka UniversityVerified email at comm.eng.osaka-u.ac.jp
Yangguang TianUniversity of SurreyVerified email at surrey.ac.uk
Falko DresslerTechnische Universität BerlinVerified email at ccs-labs.org
Xiuzhen ChengSchool of Computer Science and Technology, Shandong UniversityVerified email at sdu.edu.cn
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Fuchun GuoUniversity of WollongongVerified email at uow.edu.au