Get my own profile
Public access
View all4 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Ee-Chien ChangNational University of SingaporeVerified email at comp.nus.edu.sg
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Hoon Wei LimSingtelVerified email at singtel.com
Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Anjia YangProfessor, College of Cyber Security, Jinan UniversityVerified email at my.cityu.edu.hk
Chengfang FangPrincipal Researcher, Huawei InternationalVerified email at huawei.com
Biplab SikdarProfessor, National University of SingaporeVerified email at nus.edu.sg
Muhammad Naveed AmanUniversity of Nebraska-LincolnVerified email at unl.edu
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Cheng-Kang ChuHuawei InternationalVerified email at huawei.com
Geong Sen PohCyber Security AI R & DVerified email at ntu.edu.sg
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Zhoujun LiBeihang UniversityVerified email at buaa.edu.cn
Yiwen GAONanjing University of Science and TechnologyVerified email at njust.edu.cn
Jianting NingSingapore Management UniversityVerified email at smu.edu.sg
Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
Fan (Terry) ZhangZhejiang UniversityVerified email at zju.edu.cn
Stephane BressanNational University of SingaporeVerified email at nus.edu.sg
Zhiyong HuangAssociate Professor, Department of Computer Science, School of Computing, NUSVerified email at comp.nus.edu.sg
Joseph LiuProfessor of Law, Boston CollegeVerified email at bc.edu