Get my own profile
Public access
View all6 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Fengling HanSchool of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
Andrei KelarevRMIT UniversityVerified email at rmit.edu.au
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Hui CuiMonash UniversityVerified email at monash.edu
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Dimitrios GeorgakopoulosSwinburne University of TechnologyVerified email at swin.edu.au
Prem Prakash JayaramanSwinburne University of TechnologyVerified email at swinburne.edu.au
Ron van SchyndelAcademic at RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au
Caspar RyanSchool of CS & IT, RMIT UniversityVerified email at rmit.edu.au
Andy SongA/Prof of AI, School of Computing Technologies, CIAIRI, RMIT UniversityVerified email at rmit.edu.au
Yong FengHarbin Institute of Technology, China; RMIT University, AustraliaVerified email at hit.edu.cn
Follow
Xuechao Yang (PhD)
School of Computing Technologies, RMIT University
Verified email at rmit.edu.au - Homepage