Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Guangdong BaiAssociate Professor of The University of QueenslandVerified email at uq.edu.au
- Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
- Jun PangUniversity of LuxembourgVerified email at uni.lu
- Hugo JonkerOpen UniversiteitVerified email at ou.nl
- Ye QuanqiNational University of SingaporeVerified email at u.nus.edu
- Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
- Sihan XuNankai UniversityVerified email at nankai.edu.cn
- cyrille JegourelSUTDVerified email at sutd.edu.sg
- Dileepa FernandoSingapore University of Technology and DesignVerified email at sutd.edu.sg
- Abhik RoychoudhuryProfessor of Computer Science, National University of SingaporeVerified email at comp.nus.edu.sg
- Chenyi ZhangOracle Labs AustraliaVerified email at oracle.com
- Mark UttingThe University of QueenslandVerified email at uq.edu.au
- Wang KailongHuazhong University of Science and TechnologyVerified email at hust.edu.cn
- Tim MullerUniversity of NottinghamVerified email at ntu.edu.sg
- Manh-Dung NguyenResearch Engineer, MontimageVerified email at montimage.com
- Zhe HouGriffith UniversityVerified email at griffith.edu.au
- Abigail KoayUniversity of the Sunshine CoastVerified email at usc.edu.au
- Dr. Miao XieAARNETVerified email at aarnet.edu.au
- Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn
- Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg