Get my own profile
Public access
View all24 articles
30 articles
available
not available
Based on funding mandates
Co-authors
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Gerhard HanckeProfessor, City University of Hong Kong, IEEE FellowVerified email at cityu.edu.hk
Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Jia XU (徐佳)NUSVerified email at nus.edu.sg
Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
Aikaterini (Katerina) MitrokotsaProfessor, University of St. GallenVerified email at unisg.ch
Elena PagninChalmers University of TechnologyVerified email at chalmers.se
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Joonsang BaekAssociate Professor, University of Wollongong, AustraliaVerified email at uow.edu.au
Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongVerified email at gapps.cityu.edu.hk