Get my own profile
Public access
View all19 articles
24 articles
available
not available
Based on funding mandates
Co-authors
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Jiguo LiProfessor of Computer Science, Fujian Normal UniversityVerified email at hhu.edu.cn
Yi MuProfessorVerified email at cityu.mo
Weizhi MengDepartment of Applied Mathematics and Computer Science, Technical University of DenmarkVerified email at dtu.dk
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Jun YanUniversity of WollongongVerified email at uow.edu.au
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Jian ShenZhejiang Sci-Tech UniversityVerified email at zstu.edu.cn
Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
huaqun WangNanjing University of Posts and TelecommunicationsVerified email at njupt.edu.cn
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Xinyi Huang(黄欣沂)Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and TechnologyVerified email at ust.hk
Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
Yoga RahulamathavanLoughborough University London, UKVerified email at lboro.ac.uk
Tsz Hon YuenThe University of Hong KongVerified email at cs.hku.hk
FEI LICity University LondonVerified email at city.ac.uk
Rongxing LuIEEE Fellow, Mastercard IoT Chair, Professor in Computer Science, University of New BrunswickVerified email at unb.ca
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk