Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peter ChristenProfessor, Australian National University, and University of EdinburghVerified email at anu.edu.au
Lexing XieProfessor at Australian National UniversityVerified email at anu.edu.au
Scott SannerUniversity of TorontoVerified email at mie.utoronto.ca
Michael ComptonCSIROVerified email at csiro.au
Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
Jey Han LauComputing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Mukesh MohaniaIIIT DelhiVerified email at iiitd.ac.in
Edwin V. BonillaPrincipal Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Ehsan AbbasnejadAssoc. Prof. Monash UniversityVerified email at monash.edu
Nicolás Della PennaGroupLangVerified email at grouplang.com
Joseph NoelAsian Institute of ManagementVerified email at aim.edu
Kerry TaylorProfessor of Computer Science, Australian National UniversityVerified email at acm.org
Christopher John ButlerResearch Scientist, IBMVerified email at au1.ibm.com
Roderic BroadhurstEmeritus Professor, Regnet, Research School of Asia and the Pacific, Australian National UniversityVerified email at anu.edu.au
Alexandre RademakerIBM Research and EMAp/FGVVerified email at br.ibm.com
Ishan JindalSamsung ResearchVerified email at wayne.edu
Lianhua ChiLecturer at La Trobe UniversityVerified email at latrobe.edu.au
Trevor CohnGoogle Research (Research Scientist) & University of Melbourne (Professor; School of CIS)Verified email at unimelb.edu.au
Warren JinPrincipal Research Scientist, Data61 CSIRO AustraliaVerified email at csiro.au
Suvash SedhainTubi IncVerified email at twitter.com