Get my own profile
Public access
View all55 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Guangquan XuTianjin UniversityVerified email at tju.edu.cn
Christine JulienProfessor, University of Texas at AustinVerified email at utexas.edu
Alireza JolfaeiAssociate Professor in Cyber Security and NetworkingVerified email at flinders.edu.au
Dongjin YuHangzhou Dianzi UniversityVerified email at hdu.edu.cn
Jiong JinAssociate Professor, Swinburne University of Technology, Melbourne, AustraliaVerified email at swin.edu.au
Tian Wang (王田)Beijing Normal University, UIC, Huaqiao UniversityVerified email at bnu.edu.cn
Lei PanSenior Lecturer in Cyber Security, School of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Yao DengPh.D candidate of Computer Science, Macquarie UniversityVerified email at hdr.mq.edu.au
Xiao LiuAssociate Professor, School of Information Technology, Deakin University, Melbourne, AustraliaVerified email at deakin.edu.au
jianchao luMacquarie UniversityVerified email at students.mq.edu.au
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
YUQUN ZHANGAssistant Professor of Computer Science, Southern University of Science and TechnologyVerified email at sustech.edu.cn
Professor Shui YuSchool of Computer Science, University of Technology Sydney, AustraliaVerified email at uts.edu.au
Weijia JiaFIEEE, Chair Professor, Beijing Normal University and UICVerified email at uic.edu.cn
Tianyi ZhangPurdue UniversityVerified email at purdue.edu
Yipeng ZhouMacquarie UniversityVerified email at mq.edu.au
Miryung KimFull Professor, Computer Science, University of California, Los AngelesVerified email at cs.ucla.edu
Wanlei ZhouProfessor, City University of Macau, MacaoVerified email at cityu.edu.mo
Tom H. LuanXidian University (Xi'an, China)Verified email at xidian.edu.cn
Franck CassezConsenSys Software Inc. & Macquarie UniversityVerified email at mq.edu.au