Get my own profile
Co-authors
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Wanlei ZhouProfessor, City University of Macau, MacaoVerified email at cityu.edu.mo
Chao ChenRMIT UniversityVerified email at rmit.edu.au
Lei PanSenior Lecturer in Cyber Security, School of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Qing-Long Han, Pro Vice-Chancellor a...Swinburne University of TechnologyVerified email at swin.edu.au
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Leo Yu ZHANGSnr. Lecturer, School of ICT, Griffith UniversityVerified email at griffith.edu.au
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Yuantian MiaoUniversity of Newcastle, NSW AustraliaVerified email at newcastle.edu.au
Nan SunUniversity of New South WalesVerified email at adfa.edu.au
Gang LiProfessor, Deakin UniversityVerified email at deakin.edu.au
Yongli RenSchool of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleVerified email at temple.edu
Jonathan OliverTrend MicroVerified email at uq.edu.au
Josef PieprzykCSIRO Data61Verified email at csiro.au
Mehmet A. OrgunSchool of Computing, Macquarie UniversityVerified email at mq.edu.au
Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
Dali KaafarProfessor, Executive Director, Research Group Director Faculty of Science and Engineering MacquarieVerified email at mq.edu.au
Jason (Minhui) XueSenior Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Xi ZhengMacquarie UniversityVerified email at mq.edu.au
Follow