Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Longzhi Yang (FBCS, SMIEEE, SFHEA)Professor of Computer Science and AI, Director of Education, Department of Computer and InformationVerified email at northumbria.ac.uk
- Fei ChaoAssociate Professor, Department of Artificial Intelligence, Xiamen UniversityVerified email at xmu.edu.cn
- Zheming ZuoResearch Associate, School of Computing, Newcastle UniversityVerified email at newcastle.ac.uk
- Hubert P. H. ShumAssociate Professor and Deputy Director of Research, Durham UniversityVerified email at durham.ac.uk
- Graham SextonNorthumbria UniversityVerified email at northumbria.ac.uk
- Noe Elisa (PhD)Lecturer in Artificial Intelligence and Cyber SecurityVerified email at udom.ac.tz
- Phil HackneyNorthumbria UniversityVerified email at northumbria.ac.uk
- Edmond S. L. HoSenior Lecturer (Associate Professor), School of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
- Bo WeiSenior Lecturer (Associate Professor) in Computer Science, Newcastle UniversityVerified email at newcastle.ac.uk
- Philip AndersonNorthumbria UniversityVerified email at northumbria.ac.uk
- Martin WondersNorthumbria UniversityVerified email at northumbria.ac.uk
Follow
Jie Li
Senior Lecturer in Cybersecurity and Networks, Teesside University
Verified email at tees.ac.uk