Get my own profile
Public access
View all6 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Jianting NingSingapore Management UniversityVerified email at smu.edu.sg
- Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
- Kok-Lim Alvin YauProfessor, UTAR, MalaysiaVerified email at utar.edu.my
- Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
- Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
- Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
- Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
- Muhammad Reza Z'abaMIMOS BerhadVerified email at mimos.my
- Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
- Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
- Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
- Iftekhar SalamXiamen University MalaysiaVerified email at xmu.edu.my
- Junaid QadirProfessor of Computer Engineering, Qatar University (QU)Verified email at qu.edu.qa
- Qiang NiProfessor, Lancaster UniversityVerified email at lancaster.ac.uk
- Wai Kong LeeUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
- Peter KomisarczukRoyal Holloway, University of London, Information Security Group (ISG)Verified email at rhul.ac.uk
- David ChiengAssociate Professor of Electrical and Electronic EngineeringVerified email at nottingham.edu.cn