Get my own profile
Public access
View all98 articles
25 articles
available
not available
Based on funding mandates
Co-authors
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Dusit (Tao) NiyatoNanyang Technological University (NTU)Verified email at ntu.edu.sg
Mengmeng YangData61, CSIRO, AustraliaVerified email at data61.csiro.au
Chi-Hung ChiCSIROVerified email at csiro.auAnupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeVerified email at ntu.edu.sg
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Yang ZHAOSingapore Institute of Manufacturing Technology, A*STARVerified email at simtech.a-star.edu.sg
Muhammad Baqer MollahUniversity of HoustonVerified email at uh.edu
Xiuhua LiProfessor, School of Big Data & Software Engineering, Chongqing UniversityVerified email at cqu.edu.cn
Siu-Ming YiuProfessor of Computer Science, The University of Hong KongVerified email at cs.hku.hkAndreas BurgEPFL - Telecommunications Circuits LaboratoryVerified email at epfl.ch
Xiaohu You东南大学信息通信教授Verified email at seu.edu.cn