Get my own profile
Public access
View all48 articles
51 articles
available
not available
Based on funding mandates
Co-authors
- Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
- Jianbing NiQueen's UniversityVerified email at queensu.ca
- Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Yi MuProfessorVerified email at cityu.mo
- Xiaodong LinProfessor, IEEE Fellow, University of Guelph, CanadaVerified email at uoguelph.ca
- Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
- Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Fagen LiProfessor of University of Electronic Science and Technology of China (UESTC)Verified email at uestc.edu.cn
- Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Distinguished Prof. Athanasios Vasilak...UiA,Norway, IAU,saVerified email at uia.no
- Boyang WangUniversity of CincinnatiVerified email at uc.edu
- Hui LiXidian UniversityVerified email at mail.xidian.edu.cn