Get my own profile
Public access
View all9 articles
14 articles
available
not available
Based on funding mandates
Co-authors
- Chungen XuNanjing University of Science and TechnologyVerified email at njust.edu.cn
- Cong WangDepartment of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
- Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityVerified email at monash.edu
- Cong ZuoNanyang Technological UniversityVerified email at ntu.edu.sg
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Qian WangIEEE Fellow, Professor, School of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn
- Shi-Feng SunShanghai Jiao Tong University, ChinaVerified email at sjtu.edu.cn
- Peng ZhangShenzhen UniversityVerified email at szu.edu.cn
- CHENGJUN CAICity University of Hong KongVerified email at my.cityu.edu.hk
- Josef PieprzykCSIRO Data61Verified email at csiro.au
- SHAO Jun(邵俊)Professor, Zhejiang Gongshang UniversityVerified email at zjgsu.edu.cn
- Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
- Jianfeng WangProfessor, Xidian University, ChinaVerified email at xidian.edu.cn