Get my own profile
Public access
View all74 articles
161 articles
available
not available
Based on funding mandates
Co-authors
Wanlei ZhouProfessor, City University of Macau, MacaoVerified email at cityu.edu.mo
Longxiang GaoDeakin UniversityVerified email at deakin.edu.au
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Song GuoFCAE, FIEEE, The Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
wanchun douNanjing UniversityVerified email at nju.edu.cn
Keshav SoodLecturer in Cyber Security, Deakin University, Centre for Cyber Security Research & InnovationVerified email at deakin.edu.au
Jiaojiao JiangThe University of New South WalesVerified email at unsw.edu.au
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Hongke ZhangBeijing Jiaotong UniversityVerified email at bjtu.edu.cn
Yucheng DongProfessor of Management and Systems Sciences, Sichuan UniversityVerified email at scu.edu.cn
Follow
Professor Shui Yu
School of Computer Science, University of Technology Sydney, Australia
Verified email at uts.edu.au - Homepage