Get my own profile
Public access
View all132 articles
37 articles
available
not available
Based on funding mandates
Co-authors
Xiaojing HuangProfessor of ICT, University of Technology SydneyVerified email at uts.edu.au
Pei-Yuan QinUniversity of Technology, SydneyVerified email at uts.edu.au
Jian (Andrew) ZhangProf, University of Technology SydneyVerified email at uts.edu.au
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
Shu-Lin ChenUniversity of Technology SydneyVerified email at uts.edu.au
Richard W. ZiolkowskiDistinguished Professor, University of Technology SydneyVerified email at ece.arizona.edu
Wei NiPrincipal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
He ZhuCommonwealth Scientific and Industrial Research Organisation (CSIRO)Verified email at csiro.au
Kai WuLecturer, GBDTC, SEDE, FEIT, UTSVerified email at uts.edu.au
Trevor S. BirdAntengenuityVerified email at ieee.org
Jia DuCSIROVerified email at csiro.au
Hai-Han SunAssistant Professor, University of Wisconsin-MadisonVerified email at wisc.edu
Jose Luis Gomez TorneroTechnical University of CartagenaVerified email at upct.es
Debabrata Kumar KarmokarUniversity of South AustraliaVerified email at ieee.org
Val DyadyukCSIROVerified email at csiro.au
Xu WangSchool of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
Robert HeathLampe Distinguished Professor, North Carolina State UniversityVerified email at ncsu.edu
John BuntonCSIROVerified email at csiro.au
Maral AnsariResearch Engineer, CSIROVerified email at csiro.au
Ming LiGlobal Big Data Technologies Centre, University of Technology SydneyVerified email at uts.edu.au
Follow