Get my own profile
Public access
View all12 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Yongdong WuVerified email at i2r.a-star.edu.sg
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Haibing LuSanta Clara UniversityVerified email at scu.edu
Fuqiang GuProfessor, College of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
Kourosh KhoshelhamUniversity of MelbourneVerified email at unimelb.edu.au
Dengpan YeWuhan UniversityVerified email at whu.edu.cn
Binbin ChenSingapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Jialie ShenCity St George's, University of London, UKVerified email at city.ac.uk
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Yu ChenProfessor, School of Cyber Science and Technology, Shandong UniversityVerified email at sdu.edu.cn
zhao zhuyannokiaVerified email at vip.sina.com
Baodong Qin (秦宝东)Xi'an University of Posts and Telecommunications
Soonhung HanProfessor of Ocean Systems Engineering, KAISTVerified email at kaist.ac.kr
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu