Get my own profile
Public access
View all23 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
- Nan LiUniversity of WollongongVerified email at uow.edu.au
- Binanda SenguptaDepartment of Information Technology, IIEST ShibpurVerified email at it.iiests.ac.in
- Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
- Yi MuProfessorVerified email at cityu.mo
- Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Yinghui ZhangXUPT & SMUVerified email at smu.edu.sg
- Zheng YANGSouthwest UniversityVerified email at swu.edu.cn
- Yong Yu(禹勇)Professor, Shaanxi Normal UniversityVerified email at snnu.edu.cn
- Paweł SzałachowskiVerified email at google.com
- Ximeng Liu (刘西蒙, Simon)Professor, Fuzhou UniversityVerified email at fzu.edu.cn
- Bing ChangResearch Fellow, Singapore Management UniversityVerified email at smu.edu.sg
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
- Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
- Atsuko MiyajiOsaka UniversityVerified email at comm.eng.osaka-u.ac.jp
- Hui CuiMonash UniversityVerified email at monash.edu
- Tsz Hon YuenMonash UniversityVerified email at monash.edu
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Long MengPostDoctoral Research Fellow, University of SurreyVerified email at surrey.ac.uk