Get my own profile
Public access
View all4 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Ee-Chien ChangNational University of SingaporeVerified email at comp.nus.edu.sg
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Hoon Wei LimSingtelVerified email at singtel.com
Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Anjia YangProfessor, College of Cyber Security, Jinan UniversityVerified email at my.cityu.edu.hk
Biplab SikdarProfessor, National University of SingaporeVerified email at nus.edu.sg
Muhammad Naveed AmanUniversity of Nebraska-LincolnVerified email at unl.edu
Chengfang FangPrincipal Researcher, Huawei InternationalVerified email at huawei.com
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Cheng-Kang ChuHuawei InternationalVerified email at huawei.com
Geong Sen PohCyber Security AI R & DVerified email at ntu.edu.sg
Yiwen GAONanjing University of Science and TechnologyVerified email at njust.edu.cn
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Zhoujun LiBeihang UniversityVerified email at buaa.edu.cn
Jianting NingWuhan UniversityVerified email at whu.edu.cn
Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
Fan (Terry) ZhangZhejiang UniversityVerified email at zju.edu.cn
Stephane BressanNational University of SingaporeVerified email at nus.edu.sg
Zhiyong HuangAssociate Professor, Department of Computer Science, School of Computing, NUSVerified email at comp.nus.edu.sg
Joseph LiuProfessor of Law, Boston CollegeVerified email at bc.edu