Get my own profile
Public access
View all64 articles
15 articles
available
not available
Based on funding mandates
Co-authors
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Dusit (Tao) NiyatoNanyang Technological University (NTU)Verified email at ntu.edu.sg
- Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeVerified email at ntu.edu.sg
- Chi-Hung ChiCSIROVerified email at csiro.au
- Mengmeng YangData61, CSIRO, AustraliaVerified email at data61.csiro.au
- Yang ZhaoAgency for Science, Technology and Research (A*STAR)Verified email at simtech.a-star.edu.sg
- Muhammad Baqer MollahUniversity of Massachusetts DartmouthVerified email at umassd.edu
- Xiuhua LiProfessor, School of Big Data & Software Engineering, Chongqing UniversityVerified email at cqu.edu.cn
- Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
- Andreas BurgEPFL - Telecommunications Circuits LaboratoryVerified email at epfl.ch
- Xiaohu You东南大学信息通信教授Verified email at seu.edu.cn
- Siu-Ming YiuProfessor of Computer Science, The University of Hong KongVerified email at cs.hku.hk