Get my own profile
Public access
View all73 articles
14 articles
available
not available
Based on funding mandates
Co-authors
Dusit (Tao) NiyatoNanyang Technological University (NTU)Verified email at ntu.edu.sg
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Chi-Hung ChiCSIROVerified email at csiro.au
Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeVerified email at ntu.edu.sg
Mengmeng YangData61, CSIRO, AustraliaVerified email at data61.csiro.au
Yang ZhaoSingapore Institute of Manufacturing Technology, A*STARVerified email at simtech.a-star.edu.sg
Muhammad Baqer MollahUniversity of Massachusetts DartmouthVerified email at umassd.edu
Xiuhua LiProfessor, School of Big Data & Software Engineering, Chongqing UniversityVerified email at cqu.edu.cn
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Andreas BurgEPFL - Telecommunications Circuits LaboratoryVerified email at epfl.ch
Xiaohu You东南大学信息通信教授Verified email at seu.edu.cn
Siu-Ming YiuProfessor of Computer Science, The University of Hong KongVerified email at cs.hku.hk