Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Vijay VaradharajanThe University if NewcastleVerified email at newcastle.edu.au
- Kevin Ho-ShonMacquarie UniversityVerified email at ho-shon.com
- Omid NezamiMacquarie UniversityVerified email at mq.edu.au
- Mark DrasProfessor of Computing, Macquarie UniversityVerified email at mq.edu.au
- Prof. Shiping ChenCSIRO Data61, AustraliaVerified email at data61.csiro.au
- Deborah RichardsProfessor, Department of Computing, Macquarie UniversityVerified email at mq.edu.au
- Sarvnaz KarimiCSIROVerified email at csiro.au
- Sonit SinghSchool of Computer Science and Engineering, UNSW, AustraliaVerified email at unsw.edu.au
- Uday TupakulaUniversity of New EnglandVerified email at une.edu.au
- Stephen WanData61 CSIROVerified email at data61.csiro.au
- Mehmet A. OrgunSchool of Computing, Macquarie UniversityVerified email at mq.edu.au
- Manolya Kavakli-ThorneProfessor of Gamification & Simulation Technology, Aston University, UKVerified email at aston.ac.uk
- Tahereh Hassanzadeh, Ph.DSenior Research Associate at UNSWVerified email at unsw.edu.au
- Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
- Xi ZhengARC Future Fellow & Associate Professor (Equivalent to US Full Professor), Macquarie UniversityVerified email at mq.edu.au
- Jason (Minhui) XueSenior Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
- Anthony SloaneHonorary Associate Professor, Macquarie UniversityVerified email at mq.edu.au
- H. T. KungProfessor, Harvard UniversityVerified email at harvard.edu
- Takeo KanadeCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Peter AndersonHead of Research, Applied AI at Balyasny Asset ManagementVerified email at bamfunds.com