Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Guangdong BaiAssociate Professor of The University of QueenslandVerified email at uq.edu.au
Jun PangUniversity of LuxembourgVerified email at uni.lu
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Ye QuanqiNational University of SingaporeVerified email at u.nus.edu
Sihan XuNankai UniversityVerified email at nankai.edu.cn
cyrille JegourelSUTDVerified email at sutd.edu.sg
Dileepa FernandoNational University of SingaporeVerified email at ntu.edu.sg
Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
Tim MullerUniversity of OxfordVerified email at ntu.edu.sg
Wang KailongNational University of SingaporeVerified email at nus.edu.sg
Manh-Dung NguyenResearch Engineer, MontimageVerified email at montimage.com
Abigail KoayUniversity of QueenslandVerified email at uq.edu.au
Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
Li LiPhD of School of Computing, National University of SigaporeVerified email at comp.nus.edu.sg
Brendan MahonyResearch Scientist, Defence Science and Technology GroupVerified email at dst.defence.gov.au
Zhe HouGriffith UniversityVerified email at griffith.edu.au