Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jun PangUniversity of LuxembourgVerified email at uni.lu
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Guangdong BaiSenior Lecturer of the University of QueenslandVerified email at uq.edu.au
Ye QuanqiNational University of SingaporeVerified email at u.nus.edu
Sihan Xu南开大学Verified email at nankai.edu.cn
cyrille JegourelSUTDVerified email at sutd.edu.sg
Dileepa FernandoNational University of SingaporeVerified email at ntu.edu.sg
Tim MullerUniversity of OxfordVerified email at ntu.edu.sg
Manh-Dung NguyenResearch Engineer, MontimageVerified email at montimage.com
Wang KailongNational University of SingaporeVerified email at nus.edu.sg
Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Yang LiuUniversity Leadership Forum Chair Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Li LiPhD of School of Computing, National University of SigaporeVerified email at comp.nus.edu.sg
Brendan MahonyResearch Scientist, Defence Science and Technology GroupVerified email at dst.defence.gov.au
Zhe HouGriffith UniversityVerified email at griffith.edu.au
Abigail KoayUniversity of QueenslandVerified email at uq.edu.au