Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Guangdong BaiAssociate Professor of The University of QueenslandVerified email at uq.edu.au
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Jun PangUniversity of LuxembourgVerified email at uni.lu
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Ye QuanqiNational University of SingaporeVerified email at u.nus.edu
Sihan XuNankai UniversityVerified email at nankai.edu.cn
cyrille JegourelSUTDVerified email at sutd.edu.sg
Dileepa FernandoNational University of SingaporeVerified email at ntu.edu.sg
Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
Abhik RoychoudhuryProfessor of Computer Science, National University of SingaporeVerified email at comp.nus.edu.sg
Tim MullerUniversity of OxfordVerified email at ntu.edu.sg
Manh-Dung NguyenResearch Engineer, MontimageVerified email at montimage.com
Wang KailongHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Abigail KoayUniversity of the Sunshine CoastVerified email at usc.edu.au
Dr. Miao XieAARNETVerified email at aarnet.edu.au
Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
Li LiPhD of School of Computing, National University of SigaporeVerified email at comp.nus.edu.sg