Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
- Joonsang BaekAssociate Professor, University of Wollongong, AustraliaVerified email at uow.edu.au
- Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
- Josef PieprzykCSIRO Data61Verified email at csiro.au
- Chandana GamageProfessor, University of Moratuwa, Sri LankaVerified email at cse.mrt.ac.lk
- Yongge WangUNC CharlotteVerified email at uncc.edu
- Jun HanProfessor of Software Engineering, Swinburne University of Technology, AustraliaVerified email at swin.edu.au
- Miodrag MihaljevicMathematical Institute of the Serbian Academy of Sciences and ArtsVerified email at mi.sanu.ac.rs
- Xintao WuUniversity of ArkansasVerified email at uark.edu
- Gail-Joon AhnArizona State UniversityVerified email at asu.edu
- Yi MuProfessorVerified email at cityu.mo
- Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
- Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
- Xiaohu TangSouthwest Jiaotong UniversotyVerified email at swjtu.edu.cn
- Suzuki JoeOsaka UnivVerified email at math.sci.osaka-u.ac.jp
- Seungjoo KimProfessor at the School of Cybersecurity in Korea UniversityVerified email at korea.ac.kr
- Jan NewmarchRetiredVerified email at newmarch.name
- Gautam Singaraju, Ph.D.ServiceNowVerified email at singaraju.com
- Babak SadeghiyanAssociate Professor of Computer Engineering, Amirkabir University of Technology (Tehran Polytechnic)Verified email at aut.ac.ir
- Namje ParkProfessor of Computer Education, Jeju National University Verified email at jejunu.ac.kr
Follow
Yuliang Zheng
Professor & Chair, Computer Science, University of Alabama at Birmingham
Verified email at uab.edu - Homepage