Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Guangdong BaiAssociate Professor of The University of QueenslandVerified email at uq.edu.au
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Jun PangUniversity of LuxembourgVerified email at uni.lu
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Ye QuanqiNational University of SingaporeVerified email at u.nus.edu
Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
Sihan XuNankai UniversityVerified email at nankai.edu.cn
cyrille JegourelSUTDVerified email at sutd.edu.sg
Dileepa FernandoSingapore University of Technology and DesignVerified email at sutd.edu.sg
Abhik RoychoudhuryProfessor of Computer Science, National University of SingaporeVerified email at comp.nus.edu.sg
Chenyi ZhangOracle Labs AustraliaVerified email at oracle.com
Mark UttingThe University of QueenslandVerified email at uq.edu.au
Wang KailongHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Tim MullerUniversity of NottinghamVerified email at ntu.edu.sg
Manh-Dung NguyenResearch Engineer, MontimageVerified email at montimage.com
Zhe HouGriffith UniversityVerified email at griffith.edu.au
Abigail KoayUniversity of the Sunshine CoastVerified email at usc.edu.au
Dr. Miao XieAARNETVerified email at aarnet.edu.au
Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg