Get my own profile
Public access
View all106 articles
37 articles
available
not available
Based on funding mandates
Co-authors
Xiaojing HuangProfessor of ICT, University of Technology SydneyVerified email at uts.edu.au
Pei-Yuan QinUniversity of Technology, SydneyVerified email at uts.edu.au
Jian (Andrew) ZhangA/Prof, University of Technology SydneyVerified email at uts.edu.au
CAN DINGUniversity of Technology, Sydney (UTS)Verified email at students.mq.edu.au
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
Shu-Lin ChenUniversity of Technology SydneyVerified email at uts.edu.au
Richard W. ZiolkowskiDistinguished Professor, University of Technology SydneyVerified email at ece.arizona.edu
Wei NiInformation Privacy and Security Group, CSIROVerified email at csiro.au
He ZhuGlobal Big Data Technologies Centre, University of Technology SydneyVerified email at uts.edu.au
Jia DuCSIROVerified email at csiro.au
Trevor S. BirdAntengenuityVerified email at ieee.org
Hai-Han SunNanyang Technological UniversityVerified email at ntu.edu.sg
Jose Luis Gomez TorneroTechnical University of CartagenaVerified email at upct.es
Val DyadyukCSIROVerified email at csiro.au
Kai WuPostdoc Research Associate, GBDTC, SEDE, FEIT, UTSVerified email at uts.edu.au
Debabrata Kumar KarmokarUniversity of South AustraliaVerified email at ieee.org
John BuntonCSIROVerified email at csiro.au
Xu WangSchool of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
Robert HeathLampe Distinguished Professor, North Carolina State UniversityVerified email at ncsu.edu
WEI LINLecturer at University of Technology SydneyVerified email at uts.edu.au
Follow