Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peter ChristenProfessor, Australian National University, and University of EdinburghVerified email at anu.edu.au
Lexing XieAustralian National UniversityVerified email at anu.edu.au
Scott SannerUniversity of TorontoVerified email at mie.utoronto.ca
Michael ComptonCSIROVerified email at csiro.au
Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
Jey Han LauComputing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Edwin V. BonillaPrincipal Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Ehsan AbbasnejadAustralian Institute for Machine Learning, University of AdelaideVerified email at adelaide.edu.au
Nicolás Della PennaGroupLangVerified email at grouplang.com
Joseph NoelAsian Institute of ManagementVerified email at aim.edu
Kerry TaylorProfessor of Computer Science, Australian National UniversityVerified email at acm.org
Mukesh MohaniaIIIT DelhiVerified email at iiitd.ac.in
Christopher John ButlerResearch Scientist, IBMVerified email at au1.ibm.com
Roderic BroadhurstEmeritus Professor, Regnet, Research School of Asia and the Pacific, Australian National UniversityVerified email at anu.edu.au
Alexandre RademakerIBM Research and EMAp/FGVVerified email at br.ibm.com
Ishan JindalIBM ResearchVerified email at wayne.edu
Lianhua ChiLecturer at La Trobe UniversityVerified email at latrobe.edu.au
Trevor CohnGoogle Research (Research Scientist) & University of Melbourne (Professor; School of CIS)Verified email at unimelb.edu.au
Suvash SedhainTwitter IncVerified email at twitter.com
Rajeev GoreFaculty of Information Technology, Monash University, AustraliaVerified email at monash.edu