Get my own profile
Public access
View all36 articles
9 articles
available
not available
Based on funding mandates
Co-authors
- Xiaoshan LiAssociate Professor of Computer Science, University of MacauVerified email at umac.mo
- Anders P. RavnAalborg UniversityVerified email at cs.aau.dk
- Volker StolzHøgskulen på Vestlandet & Universitetet i OsloVerified email at foldr.org
- Zhenbang ChenProfessor, College of Computer, National University of Defense Technology, Changsha, ChinaVerified email at nudt.edu.cn
- Naijun ZhanSchool of Computer Science, Peking UniversityVerified email at ios.ac.cn
- Quan LongUniversity of CalgaryVerified email at ucalgary.ca
- Charles MorissetReader in Security, Newcastle UniversityVerified email at ncl.ac.uk
- Wei KeMacao Polytechnic UniversityVerified email at mpu.edu.mo
- Jonathan P. BowenEmeritus Professor of Computing, London South Bank UniversityVerified email at lsbu.ac.uk
- Esther PalomarUniversity of AlcalaVerified email at uah.es
- Nafees QamarBryant UniversityVerified email at bryant.edu
- Peter T. BreuerIndependent ResearcherVerified email at hecusys.com
- Jim WoodcockProfessor of Software Engineering, University of YorkVerified email at york.ac.uk
- Xia ZengSouthwest UniversityVerified email at swu.edu.cn
- Taolue ChenSchool of Computing and Mathematical Sciences, Birkbeck, University of LondonVerified email at bbk.ac.uk
- Zhengfeng YangEast China Normal UniversityVerified email at sei.ecnu.edu.cn
- Martin SchaefAmazon Web ServicesVerified email at amazon.com
- Shengchao QinProfessor of Computer Science, Teesside UniversityVerified email at tees.ac.uk
- Bo LiuSouthwest UniversityVerified email at swu.edu.cn
- Cristiano BertoliniResearcher, Federal University of Santa MariaVerified email at cin.ufpe.br