Get my own profile
Public access
View all19 articles
21 articles
available
not available
Based on funding mandates
Co-authors
Jiguo LiProfessor of Computer Science, Fujian Normal UniversityVerified email at hhu.edu.cn
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Yi MuProfessorVerified email at cityu.mo
Weizhi MengDepartment of Applied Mathematics and Computer Science, Technical University of DenmarkVerified email at dtu.dk
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Jun YanUniversity of WollongongVerified email at uow.edu.au
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Jian ShenZhejiang Sci-Tech UniversityVerified email at zstu.edu.cn
Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Xinyi Huang(黄欣沂)Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and TechnologyVerified email at ust.hk
huaqun WangNanjing University of Posts and TelecommunicationsVerified email at njupt.edu.cn
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Steve SchneiderDirector of Surrey Centre for Cyber Security; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
Yoga RahulamathavanLoughborough University London, UKVerified email at lboro.ac.uk
Tsz Hon YuenThe University of Hong KongVerified email at cs.hku.hk
FEI LICity University LondonVerified email at city.ac.uk
Rongxing LuIEEE Fellow, Mastercard IoT Research Chair, URS, Assoc. Prof. of CS, University of New BrunswickVerified email at unb.ca
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk