Get my own profile
Public access
View all13 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
- Yongdong WuVerified email at i2r.a-star.edu.sg
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
- Haibing LuSanta Clara UniversityVerified email at scu.edu
- Fuqiang GuProfessor, College of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
- Kourosh KhoshelhamUniversity of MelbourneVerified email at unimelb.edu.au
- Dengpan YeWuhan UniversityVerified email at whu.edu.cn
- Jialie ShenCity, University of London, UKVerified email at city.ac.uk
- Binbin ChenSingapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Yu ChenProfessor, School of Cyber Science and Technology, Shandong UniversityVerified email at sdu.edu.cn
- zhao zhuyannokiaVerified email at vip.sina.com
- Baodong Qin (秦宝东)Xi'an University of Posts and Telecommunications
- Soonhung HanProfessor of Ocean Systems Engineering, KAISTVerified email at kaist.ac.kr
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu