Get my own profile
Public access
View all23 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Naipeng DongThe University of QueenslandVerified email at uq.edu.au
Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
Yao Guo (郭耀)Professor of Computer Science, Peking UniversityVerified email at pku.edu.cn
Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn
Yanjun ZhangLecturer, Deakin UniversityVerified email at deakin.edu.au
Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
Ye QuanqiNational University of SingaporeVerified email at u.nus.edu
Liang GuYale UniversityVerified email at yale.edu
Prateek SaxenaNational University of SingaporeVerified email at comp.nus.edu.sg
Wang KailongNational University of SingaporeVerified email at nus.edu.sg
Xue LiProfessor, The University of QueenslandVerified email at itee.uq.edu.au
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Andrew PaverdMicrosoftVerified email at microsoft.com
Pardeep kumarSwansea UniversityVerified email at swansea.ac.uk
Jianliang WuPurdue UniversityVerified email at purdue.edu
Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Kulani MahadewaSenior Lecturer, University of MoratuwaVerified email at uom.lk
Follow
Guangdong Bai
Associate Professor of The University of Queensland
Verified email at uq.edu.au - Homepage