Get my own profile
Public access
View all48 articles
48 articles
available
not available
Based on funding mandates
Co-authors
- Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
- Jianbing NiQueen's UniversityVerified email at queensu.ca
- Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Yi MuProfessorVerified email at cityu.mo
- Xiaodong LinProfessor, IEEE Fellow, University of Guelph, CanadaVerified email at uoguelph.ca
- Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
- Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Fagen LiProfessor of University of Electronic Science and Technology of China (UESTC)Verified email at uestc.edu.cn
- Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
- Distinguished Prof. Athanasios Vasilak...UiA,norwayVerified email at uia.no
- Boyang WangUniversity of CincinnatiVerified email at uc.edu
- Hui LiXidian UniversityVerified email at mail.xidian.edu.cn