Get my own profile
Public access
View all67 articles
46 articles
available
not available
Based on funding mandates
Co-authors
Wei NiPrincipal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Prof. Y. Jay GuoUniversity of Technology Sydney, AustraliaVerified email at uts.edu.au
Xiangjian HeUNNCVerified email at nottingham.edu.cn
Iain CollingsMacquarie UniversityVerified email at mq.edu.au
Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
Gordon SuttonUniversity of Technology SydneyVerified email at uts.edu.au
Dr. Aruna JamdagniSchool of Computing and Mats, WesternSydney UniversityVerified email at westernsydney.edu.au
Xin WangFudan UniversityVerified email at fudan.edu.cn
Prof. Sanjay JhaProfessor, School of Computer Science and Engineering, University of New South WalesVerified email at cse.unsw.edu.au
Mehran AbolhasanProfessor, University of Technology SydneyVerified email at uts.edu.au
Mian Ahmad JanAssistant Professor, College of Computing and Informatics, University of SharjahVerified email at sharjah.ac.ae
Xiaofeng TaoBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
z. rosbergVerified email at fairflows.com
Mark HedleyCSIRO Data61Verified email at csiro.au
salil kanhereProfessor, UNSW Sydney, AustraliaVerified email at unsw.edu.au
yuanan liuProfessor of electronic engineeringVerified email at bupt.edu.cn
Dr. Shiping ChenCSIRO Data61 AustraliaVerified email at data61.csiro.au
Hongyan CuiBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
Kai LiSenior Research Scientist and CMU-Portugal Research Fellow, CISTER research centre, PortugalVerified email at ieee.org