Get my own profile
Public access
View all30 articles
20 articles
available
not available
Based on funding mandates
Co-authors
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Josef PieprzykCSIRO Data61Verified email at csiro.au
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Joonsang BaekAssociate Professor, University of Wollongong, AustraliaVerified email at uow.edu.au
Philip O. OgunbonaProfessor of Computer Science, University of WollongongVerified email at uow.edu.au
Fangguo ZhangSun Yat-sen UniversityVerified email at mail.sysu.edu.cn
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Joseph TonienUniversity of WollongongVerified email at uow.edu.au
Shaoquan JiangUniversity of WindsorVerified email at uwindsor.ca
Pengwei WangUniversity of CalgaryVerified email at ucalgary.ca
FUCHUN LINPostdoc at University of CalgaryVerified email at e.ntu.edu.sg
Mohammad JafariArizona State UniversityVerified email at ucalgary.ca
Mohsen AlimomeniResearch Assistant, University of CalgaryVerified email at ucalgary.ca
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Jörg DenzingerDepartment of Computer Science, University of CalgaryVerified email at cpsc.ucalgary.ca
Philip W. L. FongUniversity of CalgaryVerified email at ucalgary.ca
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Anish MathuriaProfessor, DA-IICTVerified email at daiict.ac.in
Wanqing LiProfessor, University of WollongongVerified email at uow.edu.au