Get my own profile
Public access
View all20 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Yingjiu LiRipple Professor, Computer and Information Science Department, University of OregonVerified email at uoregon.edu
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Yi MuProfessorVerified email at cityu.mo
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaVerified email at zhejianglab.com
Xuechao Yang (PhD)School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Yinghui ZhangXUPT & SMUVerified email at smu.edu.sg
Fuchun GuoUniversity of WollongongVerified email at uow.edu.au
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Andrei KelarevRMIT UniversityVerified email at rmit.edu.au
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Yangguang TianUniversity of SurreyVerified email at surrey.ac.uk
Tsz Hon YuenThe University of Hong KongVerified email at cs.hku.hk
Baodong Qin (秦宝东)Xi'an University of Posts and Telecommunications