Get my own profile
Public access
View all26 articles
28 articles
available
not available
Based on funding mandates
Co-authors
Yi MuProfessor (Retired)Verified email at cityu.mo
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Rongmao Chen (陈荣茂)Associate Professor, National University of Defense TechnologyVerified email at nudt.edu.cn
Guomin YangAssociate Professor of Computer Science, University of WollongongVerified email at uow.edu.au
Xinyi Huang(黄欣沂)School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, ChinaVerified email at fjnu.edu.cn
Li Xu(许力)Fujian Normal UniversityVerified email at fjnu.edu.cn
Nan LiUniversity of NewcastleVerified email at newcastle.edu.au
Mingwu ZhangHubei University of TechnologyVerified email at mail.hbut.edu.cn
Man Ho AuThe University of Hong KongVerified email at cs.hku.hk
Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
Joseph K. LiuAssociate Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Jongkil KimUniversity of WollongongVerified email at data61.csiro.au
Jorge MunillaProfessor of Telecommunication Engineering, University of MalagaVerified email at ic.uma.es
Yang-Wai ChowUniversity of WollongongVerified email at uow.edu.au
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au