Get my own profile
Public access
View all61 articles
67 articles
available
not available
Based on funding mandates
Co-authors
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Tianqing ZhuCity University of MacauVerified email at cityu.edu.mo
Prof Shui YuFIEEE, BoG of IEEE ComSoc , School of Computer Science, University of Technology SydneyVerified email at uts.edu.au
Bo LiuUniversity of Technology SydneyVerified email at uts.edu.au
Jun ZhangProfessor, Swinburne University of TechnologyVerified email at swin.edu.au
Weijia JiaFIEEE, Chair Professor, Beijing Normal University and UICVerified email at uic.edu.cn
Gang LiProfessor, Deakin UniversityVerified email at deakin.edu.au
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Robin DossDeakin Cyber Research & Innovation Centre (Deakin Cyber), Deakin UniversityVerified email at deakin.edu.au
Jiaojiao JiangThe University of New South WalesVerified email at unsw.edu.au
Chao ChenRMIT UniversityVerified email at rmit.edu.au
Ashley ChonkaI.T Security Researcher and DeveloperVerified email at internode.on.net
Naomi Whiteside (nee Augar)Ex academic