Get my own profile
Public access
View all28 articles
38 articles
available
not available
Based on funding mandates
Co-authors
Cong WangDepartment of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Xingliang YuanSchool of Computing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongVerified email at gapps.cityu.edu.hk
Yansong GaoCSIRO's Data61Verified email at data61.csiro.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
CHENGJUN CAICity University of Hong KongVerified email at my.cityu.edu.hk
Jiantao ZhouProfessor, Department of Computer and Information Science, University of MacauVerified email at umac.mo
Helei CuiSchool of Computer Science, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn
Leo Yu ZHANGSnr. Lecturer, School of ICT, Griffith UniversityVerified email at griffith.edu.au
Qian WangIEEE Fellow, Professor, School of Cyber Science and Engineering, Wuhan UniversityVerified email at whu.edu.cn