Get my own profile
Public access
View all24 articles
26 articles
available
not available
Based on funding mandates
Co-authors
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
- Gerhard HanckeProfessor, City University of Hong Kong, IEEE FellowVerified email at cityu.edu.hk
- Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Jia XU (徐佳)NUSVerified email at nus.edu.sg
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Aikaterini (Katerina) MitrokotsaProfessor, University of St. GallenVerified email at unisg.ch
- Elena PagninChalmers University of TechnologyVerified email at chalmers.se
- Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Joonsang BaekAssociate Professor, University of Wollongong, AustraliaVerified email at uow.edu.au
- Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongVerified email at gapps.cityu.edu.hk