Get my own profile
Public access
View all9 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Branka VuceticThe University of SydneyVerified email at sydney.edu.au
Jinhong YuanProfessor of Electrical Engineering and Telecommunications, University of New South WalesVerified email at unsw.edu.au
Yonghui Lithe University of SydneyVerified email at sydney.edu.au
Peng ChengLa Trobe University/The University of SydneyVerified email at sydney.edu.au
Iain CollingsMacquarie UniversityVerified email at mq.edu.au
Hajime SuzukiCSIROVerified email at csiro.au
Zhendong ZhouUniversity of SydneyVerified email at ee.usyd.edu.au
Jian (Andrew) ZhangProf, University of Technology SydneyVerified email at uts.edu.au
Maged ElkashlanAssociate Professor, Queen Mary University of LondonVerified email at qmul.ac.uk
Douglas B. HaymanCSIROVerified email at csiro.au
Prof. Y. Jay GuoUniversity of Technology Sydney, AustraliaVerified email at uts.edu.au
Yun RuiShanghai Advanced Research Institute, Chinese Academy of Sciences, ChinaVerified email at sari.ac.cn
Chang Kyung SungThales AustraliaVerified email at thalesgroup.com.au
Wei NiPrincipal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Frank de HoogCSIRO Mathematics, Informatics and StastisticsVerified email at csiro.au
Jun LiNanjing University of Science and TechnologyVerified email at njust.edu.cn
Phil YeohUniversity of the Sunshine CoastVerified email at usc.edu.au
Meixia TaoProfessor at Shanghai Jiao Tong University; Fellow of IEEEVerified email at sjtu.edu.cn
Ingmar LandInfineraVerified email at ieee.org
Yi HongAssociate Professor, Monash UniversityVerified email at monash.edu