Get my own profile
Public access
View all55 articles
28 articles
available
not available
Based on funding mandates
Co-authors
Yanchun ZhangGuangzhou University, Pengcheng Laboratory,Victoria UniversityVerified email at vu.edu.au
Jinli CaoLa Trobe UniversityVerified email at latrobe.edu.au
Siuly SiulyResearch Fellow, Victoria University, AustraliaVerified email at vu.edu.au
Jiuyong Li (李久永)Professor of Computer Science, University of South AustraliaVerified email at unisa.edu.au
Ji ZhangThe University Southern QueenslandVerified email at usq.edu.au
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Quan Z. (Michael) ShengFull Professor, School of Computing, Macquarie University, Sydney, AustraliaVerified email at mq.edu.au
Xiaohui TaoUniversity of Southern QueenslandVerified email at usq.edu.au
Rui ZhouSwinburne University of Technology, AustraliaVerified email at swin.edu.au
Jiangang MaFederation University, AustraliaVerified email at federation.edu.au
Xiaoxia Yin; Xiao-Xia YinDr of Electronic Engineering, The Univeristy of AdelaideVerified email at vu.edu.au
jeffrey soarUniversity of Southern QueenslandVerified email at usq.edu.au
Xiuzhen (Jenny) ZhangProfessor, School of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
Yongzhi WangPark UniversityVerified email at park.edu
Yuanyu ZhangXidian UniversityVerified email at xidian.edu.cn
Georgios KambourakisProfessor, Dept. of Information and Communication Systems Eng., University of the AegeanVerified email at aegean.gr
Traian Marius TrutaProfessor of Computer Science, Northern Kentucky UniversityVerified email at nku.edu
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Zonghua Zhang (张宗华)Huawei Paris Research CenterVerified email at ieee.org
Stijn DekeyserAssociate Professor of Computing, University of Southern QueenslandVerified email at usq.edu.au