Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
Joonsang BaekAssociate Professor, University of Wollongong, AustraliaVerified email at uow.edu.au
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
Josef PieprzykCSIRO Data61Verified email at csiro.au
Chandana GamageProfessor, University of Moratuwa, Sri LankaVerified email at cse.mrt.ac.lk
Yongge WangUNC CharlotteVerified email at uncc.edu
Jun HanProfessor of Software Engineering, Swinburne University of Technology, AustraliaVerified email at swin.edu.au
Miodrag MihaljevicMathematical Institute of the Serbian Academy of Sciences and ArtsVerified email at mi.sanu.ac.rs
Xintao WuUniversity of ArkansasVerified email at uark.edu
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Yi MuProfessorVerified email at cityu.mo
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Xiaohu TangSouthwest Jiaotong UniversotyVerified email at swjtu.edu.cn
Suzuki JoeOsaka UnivVerified email at math.sci.osaka-u.ac.jp
Seungjoo KimProfessor at the School of Cybersecurity in Korea UniversityVerified email at korea.ac.kr
Jan NewmarchRetiredVerified email at newmarch.name
Gautam Singaraju, Ph.D.ServiceNowVerified email at singaraju.com
Babak SadeghiyanAssociate Professor of Computer Engineering, Amirkabir University of Technology (Tehran Polytechnic)Verified email at aut.ac.ir
Namje ParkProfessor of Computer Education, Jeju National University Verified email at jejunu.ac.kr
Follow
Yuliang Zheng
Professor & Chair, Computer Science, University of Alabama at Birmingham
Verified email at uab.edu - Homepage