Get my own profile
Public access
View all44 articles
32 articles
available
not available
Based on funding mandates
Co-authors
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Yi MuProfessorVerified email at cityu.mo
Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
Rongmao Chen (陈荣茂)Professor, National University of Defense TechnologyVerified email at nudt.edu.cn
Li Xu(许力)Fujian Normal UniversityVerified email at fjnu.edu.cn
Nan LiUniversity of WollongongVerified email at uow.edu.au
MINGWU ZHANGHubei University of TechnologyVerified email at hbut.edu.cn
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Jongkil KimEwha Womans UniversityVerified email at ewha.ac.kr
Jorge MunillaProfessor of Telecommunication Engineering, University of MalagaVerified email at ic.uma.es
Yang-Wai ChowUniversity of WollongongVerified email at uow.edu.au
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au