Get my own profile
Public access
View all4 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Jun ZhangProfessor, Swinburne University of TechnologyVerified email at swin.edu.au
Wanlei ZhouProfessor, City University of Macau, MacaoVerified email at cityu.edu.mo
Lei PanSenior Lecturer in Cyber Security, School of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Shigang LiuSwinburne University of TechnologyVerified email at swin.edu.au
Yu WangGuangzhou UniversityVerified email at gzhu.edu.cn
Yuantian MiaoUniversity of Newcastle, NSW AustraliaVerified email at newcastle.edu.au
Liu LiuSwinburne University of TechnologyVerified email at swin.edu.au
Jonathan OliverTrend MicroVerified email at uq.edu.au
Qing-Long Han, Pro Vice-Chancellor a...Swinburne University of TechnologyVerified email at swin.edu.au
Jason (Minhui) XueSenior Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Lin LiSwinburne University of TechnologyVerified email at swin.edu.au
Xiao ChenMonash UniversityVerified email at monash.edu