Get my own profile
Public access
View all24 articles
32 articles
available
not available
Based on funding mandates
Co-authors
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Professor Shui YuSchool of Computer Science, University of Technology Sydney, AustraliaVerified email at uts.edu.au
Tianqing ZhuUniversity of Technology SydneyVerified email at uts.edu.au
Weijia JiaFIEEE, Chair Professor, Beijing Normal University and UICVerified email at uic.edu.cn
Jun ZhangSwinburne University of TechnologyVerified email at swin.edu.au
Gang LiDeakin UniversityVerified email at acm.org
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Bo LiuUniversity of Technology SydneyVerified email at uts.edu.au
Jiaojiao JiangThe University of New South WalesVerified email at unsw.edu.au
Ashley ChonkaI.T Security Researcher and DeveloperVerified email at internode.on.net
Naomi Whiteside (nee Augar)RMIT UniversityVerified email at rmit.edu.au
Chao ChenJames Cook UniversityVerified email at jcu.edu.au