Get my own profile
Public access
View all92 articles
44 articles
available
not available
Based on funding mandates
Co-authors
Hua WangProfessor, Victoria UniversityVerified email at vu.edu.au
Jinli CaoLa Trobe UniversityVerified email at latrobe.edu.au
Siuly SiulyResearch Fellow, Victoria University, AustraliaVerified email at vu.edu.au
Guandong Xu, PhDProfessor in Data Science, University of Technology SydneyVerified email at uts.edu.au
Guangyan HuangDeakin UniversityVerified email at deakin.edu.au
Xiaoxia Yin; Xiao-Xia YinDr of Electronic Engineering, The Univeristy of AdelaideVerified email at vu.edu.au
Jiangang MaFederation University, AustraliaVerified email at federation.edu.au
Maria E OrlowskaProfesor Informatyki, PJWSTKVerified email at pjwstk.edu.pl
Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongVerified email at gapps.cityu.edu.hk
Le Sun (Sarah Sun)Nanjing University of Information Science and TechnologyVerified email at nuist.edu.cn
Xiaofang ZhouHong Kong University of Science and TechnologyVerified email at cse.ust.hk
Chengzheng SunProfessor of Computer Science, Nanyang Technological University, SingaporeVerified email at ntu.edu.sg
Yun YangSwinburne University of TechnologyVerified email at swin.edu.au
Rui ZhouSwinburne University of Technology, AustraliaVerified email at swin.edu.au
Lin LiWuhan University of TechnologyVerified email at whut.edu.cn
Khandakar AhmedSenior Lecturer, Victoria UniversityVerified email at ieee.org
Jie CaoNanjing University of Finance and EconomicsVerified email at nufe.edu.cn
Supriya SupriyaPresently Lecturer at Torrens University Australia.Verified email at torrens.edu.au
David ChenGriffith UniversityVerified email at griffith.edu.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Follow
Yanchun Zhang
Guangzhou University, Pengcheng Laboratory,Victoria University
Verified email at vu.edu.au - Homepage