Get my own profile
Public access
View all31 articles
45 articles
available
not available
Based on funding mandates
Co-authors
Cong WangDepartment of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Xingliang YuanSchool of Computing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongVerified email at gapps.cityu.edu.hk
Yansong (Garrison) GaoThe University of Western AustraliaVerified email at uwa.edu.au
Songlei Wang (王松磊)Assistant Professor, Shenzhen UniversityVerified email at szu.edu.cn
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
CHENGJUN CAICity University of Hong KongVerified email at my.cityu.edu.hk
Jiantao ZhouProfessor, Department of Computer and Information Science, University of MacauVerified email at umac.mo
Helei CuiSchool of Computer Science, Northwestern Polytechnical UniversityVerified email at nwpu.edu.cn