Get my own profile
Public access
View all61 articles
60 articles
available
not available
Based on funding mandates
Co-authors
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
- Tianqing ZhuCity University of MacauVerified email at cityu.edu.mo
- Prof Shui YuFIEEE, BoG of IEEE ComSoc and VTS, School of Computer Science, University of Technology SydneyVerified email at uts.edu.au
- Jun ZhangProfessor, Swinburne University of TechnologyVerified email at swin.edu.au
- Bo LiuUniversity of Technology SydneyVerified email at uts.edu.au
- Weijia JiaFIEEE, Chair Professor, Beijing Normal University and UICVerified email at uic.edu.cn
- Gang LiProfessor, Deakin UniversityVerified email at deakin.edu.au
- Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
- Robin DossDeakin Cyber Research & Innovation Centre (Deakin Cyber), Deakin UniversityVerified email at deakin.edu.au
- Jiaojiao JiangThe University of New South WalesVerified email at unsw.edu.au
- Chao ChenRMIT UniversityVerified email at rmit.edu.au
- Ashley ChonkaI.T Security Researcher and DeveloperVerified email at internode.on.net
- Naomi Whiteside (nee Augar)Ex academic