Get my own profile
Public access
View all30 articles
33 articles
available
not available
Based on funding mandates
Co-authors
- Cong WangDepartment of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
- Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityVerified email at monash.edu
- Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongVerified email at gapps.cityu.edu.hk
- Yansong GaoCSIRO's Data61Verified email at data61.csiro.au
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
- CHENGJUN CAICity University of Hong KongVerified email at my.cityu.edu.hk
- Helei CuiSchool of Computer Science, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
- Jiantao ZhouProfessor, Department of Computer and Information Science, University of MacauVerified email at umac.mo
- Leo Yu ZHANGSnr. Lecturer, School of ICT, Griffith UniversityVerified email at griffith.edu.au
- Qian WangIEEE Fellow, Professor, School of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn