Get my own profile
Public access
View all91 articles
22 articles
available
not available
Based on funding mandates
Co-authors
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Yi MuProfessorVerified email at cityu.mo
Qiong HuangSouth China Agricultural UniversityVerified email at my.cityu.edu.hk
Fuchun GuoUniversity of WollongongVerified email at uow.edu.au
Rongmao Chen (陈荣茂)Professor, National University of Defense TechnologyVerified email at nudt.edu.cn
Xiaotie DengChair Professor of Computer Science, Peking University, Beijing, ChinaVerified email at pku.edu.cnRobert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Tran Viet Xuan PhuongUniversity of Arkansas at Little RockVerified email at ualr.edu
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Dr. Kaitai LiangCybersecurity engineering, UTU & TU DelftVerified email at utu.fi
Yang-Wai ChowUniversity of WollongongVerified email at uow.edu.auAnjia YangProfessor, College of Cyber Security, Jinan UniversityVerified email at my.cityu.edu.hk
Khoa NguyenUniversity of Wollongong, AustraliaVerified email at uow.edu.au
Jing ChenTsinghua University; Algorand Inc; Stony Brook University; IAS; MITVerified email at tsinghua.edu.cn
Dr. Zhen LiuShanghai Jiao Tong UniversityVerified email at my.cityu.edu.hk
Hoon Wei LimSingtelVerified email at singtel.comLiqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Follow
Guomin Yang
Associate Professor of Computer Science, Singapore Management University
Verified email at smu.edu.sg