Get my own profile
Public access
View all35 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Yuliang ZhengProfessor & Chair, Computer Science, University of Alabama at BirminghamVerified email at uab.edu
Joonsang BaekAssociate Professor, University of Wollongong, AustraliaVerified email at uow.edu.au
Keita XagawaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
Tancrède LepointResearch Scientist, GoogleVerified email at google.com
Arjen LenstraProfessor of Computer Science, EPFLVerified email at epfl.ch
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Hossein GhodosiSenior Lecturer, College of Business, Law and Governance, James Cook UniversityVerified email at jcu.edu.au
Mu-En Wu (吳牧恩, mnwu)臺北科技大學資訊與財金管理系Verified email at ntut.edu.tw