Get my own profile
Public access
View all3 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Jinli CaoLa Trobe UniversityVerified email at latrobe.edu.au
- Jiao YinResearch Fellow, La Trobe UniversityVerified email at latrobe.edu.au
- Hua WangProfessor, Victoria UniversityVerified email at vu.edu.au
- Youlong WUShanghaiTech UniversityVerified email at shanghaitech.edu.cn
- Sumudu MendisAustralian National UniversityVerified email at cs.anu.edu.au
- Guowen XuUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Kewen LiaoAssociate Professor, ACU North SydneyVerified email at acu.edu.au
- Jie ShaoProfessor, University of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Hailin HuHuawei Noah's Ark LabVerified email at mails.tsinghua.edu.cn
- Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongVerified email at gapps.cityu.edu.hk
- Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneVerified email at latrobe.edu.au