Get my own profile
Public access
View all32 articles
26 articles
available
not available
Based on funding mandates
Co-authors
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Yi MuProfessorVerified email at cityu.mo
Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
Rongmao Chen (陈荣茂)Associate Professor, National University of Defense TechnologyVerified email at nudt.edu.cn
Xinyi Huang(黄欣沂)Thrust of Artificial Intelligence, Information Hub, Hong Kong University of Science and TechnologyVerified email at ust.hk
Li Xu(许力)Fujian Normal UniversityVerified email at fjnu.edu.cn
Nan LiUniversity of NewcastleVerified email at newcastle.edu.au
Mingwu ZhangHubei University of TechnologyVerified email at mail.hbut.edu.cn
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Jongkil KimEwha Womans UniversityVerified email at ewha.ac.kr
Jorge MunillaProfessor of Telecommunication Engineering, University of MalagaVerified email at ic.uma.es
Yang-Wai ChowUniversity of WollongongVerified email at uow.edu.au
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au