Get my own profile
Public access
View all43 articles
26 articles
available
not available
Based on funding mandates
Co-authors
- Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
- Yi MuProfessorVerified email at cityu.mo
- Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
- Rongmao Chen (陈荣茂)Associate Professor, National University of Defense TechnologyVerified email at nudt.edu.cn
- Li Xu(许力)Fujian Normal UniversityVerified email at fjnu.edu.cn
- Nan LiUniversity of WollongongVerified email at uow.edu.au
- MINGWU ZHANGHubei University of TechnologyVerified email at hbut.edu.cn
- Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Jongkil KimEwha Womans UniversityVerified email at ewha.ac.kr
- Jorge MunillaProfessor of Telecommunication Engineering, University of MalagaVerified email at ic.uma.es
- Yang-Wai ChowUniversity of WollongongVerified email at uow.edu.au
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au