Get my own profile
Public access
View all4 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Ee-Chien ChangNational University of SingaporeVerified email at comp.nus.edu.sg
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Hoon Wei LimSingtelVerified email at singtel.com
- Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
- Anjia YangProfessor, College of Cyber Security, Jinan UniversityVerified email at my.cityu.edu.hk
- Biplab SikdarProfessor, National University of SingaporeVerified email at nus.edu.sg
- Muhammad Naveed AmanUniversity of Nebraska-LincolnVerified email at unl.edu
- Chengfang FangPrincipal Researcher, Huawei InternationalVerified email at huawei.com
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Cheng-Kang ChuHuawei InternationalVerified email at huawei.com
- Geong Sen PohCyber Security AI R & DVerified email at ntu.edu.sg
- Yiwen GAONanjing University of Science and TechnologyVerified email at njust.edu.cn
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Zhoujun LiBeihang UniversityVerified email at buaa.edu.cn
- Jianting NingWuhan UniversityVerified email at whu.edu.cn
- Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
- Fan (Terry) ZhangZhejiang UniversityVerified email at zju.edu.cn
- Stephane BressanNational University of SingaporeVerified email at nus.edu.sg
- Zhiyong HuangAssociate Professor, Department of Computer Science, School of Computing, NUSVerified email at comp.nus.edu.sg
- Joseph LiuProfessor of Law, Boston CollegeVerified email at bc.edu