Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
Geong Sen PohCyber Security AI R & DVerified email at ntu.edu.sg
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Jin ZheProfessor of Computer Science, Anhui UniversityVerified email at ahu.edu.cn
Iftekhar SalamXiamen University MalaysiaVerified email at xmu.edu.my
Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
Rouzbeh BehniaUniversity of South FloridaVerified email at usf.edu
Yvonne Kam Hwei SynMultimedia UniversityVerified email at mmu.edu.my
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Chee Siang WongUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Andrew Teoh Beng JinProfessor of Electrical and Electronic Engineering, Yonsei University, KoreaVerified email at yonsei.ac.kr