Get my own profile
Public access
View all17 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Edwin HancockEmeritus Professor, Department of Computer Science, University of York, UKVerified email at cs.york.ac.uk
Jun ZhouSchool of Information and Communication Technology, Griffith UniversityVerified email at griffith.edu.au
Cong Phuoc HuynhSenior Applied Scientist at Amazon Lab126Verified email at amazon.com
Zhouyu FuLead Researcher, Microsoft Research AsiaVerified email at microsoft.com
Lin GuResearch Scientist, RIKEN AIP, University of TokyoVerified email at mi.t.u-tokyo.ac.jp
Andrea TORSELLOProfessor of Computer Science, Universitą Ca' Foscari VeneziaVerified email at unive.it
YOU ShaodiAssistant Professor, University of AmsterdamVerified email at uva.nl
Yuntao QianProfessor of Computer Science, Zhejiang UniversityVerified email at zju.edu.cn
Sen JiaShenzhen universityVerified email at szu.edu.cn
Ran WeiDATA61/CSIROVerified email at csiro.au
Terry CaelliDeakin UniversityVerified email at deakin.edu.au
Mark PickeringUNSW CanberraVerified email at adfa.edu.au
Richard C WilsonDepartment of Computer Science, University of YorkVerified email at york.ac.uk
Mengmeng GeSchool of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Zubair BaigAssociate Professor, Cyber-Security, Deakin University, Melbourne, AustraliaVerified email at deakin.edu.au
Junxuan LiThe Australian National UniversityVerified email at anu.edu.au
Bin LuoAnhui University, University of YorkVerified email at ahu.edu.cn
Sejuti RahmanUniversity of DhakaVerified email at alumni.anu.edu.au
Xiuping JiaUniversity of New South WalesVerified email at adfa.edu.au
Hongdong LiProfessor of Computer Vision and Learning, Australian National UniversityVerified email at anu.edu.au
Follow
Antonio Robles-Kelly
School of Information Technology, Deakin University
Verified email at deakin.edu.au - Homepage