Get my own profile
Public access
View all58 articles
71 articles
available
not available
Based on funding mandates
Co-authors
Tianqing ZhuCity University of MacauVerified email at cityu.edu.mo
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Prof Shui YuFIEEE, BoG of IEEE ComSoc , School of Computer Science, University of Technology SydneyVerified email at uts.edu.au
Bo LiuUniversity of Technology SydneyVerified email at uts.edu.au
Jun ZhangProfessor, Swinburne University of TechnologyVerified email at swin.edu.au
Weijia JiaFIEEE, Chair Professor, Beijing Normal University and UICVerified email at uic.edu.cn
Gang LiProfessor, Deakin UniversityVerified email at deakin.edu.au
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Robin DossDeakin Cyber Research & Innovation Centre (Deakin Cyber), Deakin UniversityVerified email at deakin.edu.au
Jiaojiao JiangThe University of New South WalesVerified email at unsw.edu.au
Chao ChenRMIT UniversityVerified email at rmit.edu.au
Ashley ChonkaI.T Security Researcher and DeveloperVerified email at internode.on.net
Naomi Whiteside (nee Augar)Ex academic