Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Prof. Richard O. SinnottSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
- Iis TussyadiahUniversity of SurreyVerified email at surrey.ac.uk
- Ali Kashif Bashir, PhD, SMIEEE.Professor at Manchester Metropolitan University, UK; Clarivate Highly Cited ResearcherVerified email at ieee.org
- Karin VerspoorExecutive Dean, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Udaya ParampalliProfessor, School of Computing and Information Systems, University of Melbourne, AustraliaVerified email at unimelb.edu.au
- Yuchun XuProfessor of Manufacturing, Aston UniversityVerified email at aston.ac.uk
- Ming ZhangAston UniversityVerified email at aston.ac.uk
- Keping Yu, PhDAssociate Professor, Hosei University, JapanVerified email at ieee.org