Get my own profile
Public access
View all28 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Nan LiUniversity of WollongongVerified email at uow.edu.au
Binanda SenguptaDepartment of Information Technology, IIEST ShibpurVerified email at it.iiests.ac.in
Yi MuProfessorVerified email at cityu.mo
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Guomin YangAssociate Professor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Yinghui ZhangXUPT & SMUVerified email at smu.edu.sg
Yong Yu(禹勇)Professor, Shaanxi Normal UniversityVerified email at snnu.edu.cn
Zheng YANGSouthwest UniversityVerified email at swu.edu.cn
Paweł SzałachowskiVerified email at google.com
Ximeng Liu (刘西蒙, Simon)Professor, Fuzhou UniversityVerified email at fzu.edu.cn
Bing ChangResearch Fellow, Singapore Management UniversityVerified email at smu.edu.sg
Atsuko MiyajiOsaka UniversityVerified email at comm.eng.osaka-u.ac.jp
Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl
Hui CuiMonash UniversityVerified email at monash.edu
Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Tsz Hon YuenMonash UniversityVerified email at monash.edu
Long MengPostDoctoral Research Fellow, University of SurreyVerified email at surrey.ac.uk