Get my own profile
Public access
View all16 articles
33 articles
available
not available
Based on funding mandates
Co-authors
Yong FengHarbin Institute of Technology, China; RMIT University, AustraliaVerified email at hit.edu.cn
Xinghuo YuFAA, FIEEE, HonFIEAust, Distinguished Professor @ RMIT UniversityVerified email at rmit.edu.au
Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Xuechao YangCollege of ABLE&IT, Victoria UniversityVerified email at vu.edu.au
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Jinhu LuProfessor of Beihang UniversityVerified email at iss.ac.cn
Ron van SchyndelAcademic at RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au
Guanrong ChenCity University of Hong KongVerified email at cityu.edu.hk
Xuemei ZhengProfessor, Harbin Institute of Technology, ChinaVerified email at hit.edu.cn
Tohari AhmadDepartment of Informatics, Institut Teknologi Sepuluh NopemberVerified email at if.its.ac.id
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Yi (Alice) WangDongguan University of TechnologyVerified email at ieee.org
Rebecca Jing YangRMIT UniversityVerified email at rmit.edu.au
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Ligang HeReader of Computer Science, University of Warwick, United KingdomVerified email at warwick.ac.uk
Minghao Zhou (周铭浩)Harbin Institute of Technology, China; RMIT University, Australia; HUST, China
Follow![Fengling Han](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=lJNy2Kc58cIC&citpid=4)
Fengling Han
School of Computing Technologies, RMIT University, Australia
Verified email at rmit.edu.au - Homepage