Get my own profile
Public access
View all57 articles
21 articles
available
not available
Based on funding mandates
Co-authors
Wenjing JiaUniversity of Technology SydneyVerified email at uts.edu.au
Priyadarsi NandaSenior Lecturer at University of Technology, SydneyVerified email at uts.edu.au
Qiang WuAssociate Professor, School of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
Mian Ahmad JanAssistant Professor, College of Computing and Informatics, University of SharjahVerified email at sharjah.ac.ae
Dr. Aruna JamdagniSchool of Computing and Mats, WesternSydney UniversityVerified email at westernsydney.edu.au
Kenneth Kin-Man LamThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
WEI-CHANG YEHChair Professor, National Tsing-Hua UniversityVerified email at ie.nthu.edu.tw
Mohammed AmbusaidiUniversity of technology and applied sciencesVerified email at cas.edu.om
Changsheng XuProfessor, Institute of Automation, Chinese Academy of SciencesVerified email at nlpr.ia.ac.cn
Keren FuSichuan University, College of Computer ScienceVerified email at scu.edu.cn
suhuai luothe university of newcastleVerified email at newcastle.edu.au
Tao ZhouNanjing University of Science and Technology, IIAI, UNC, SJTUVerified email at njust.edu.cn
Vera Yuk Ying ChungSchool of Computer Science, University of Sydney, AustraliaVerified email at it.usyd.edu.au
Muhammad Abul HasanGreen University of BangladeshVerified email at cse.green.edu.bd
Massimo PiccardiProfessor, University of Technology SydneyVerified email at uts.edu.au
Chen GongProfessor@Nanjing University of Science and TechnologyVerified email at njust.edu.cn
Hamid R ArabniaProfessor Emeritus of Computer Science, University of GeorgiaVerified email at uga.edu