Get my own profile
Public access
View all22 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Guandong Xu, PhDProfessor in Data Science, University of Technology SydneyVerified email at uts.edu.au
Shaowu LiuVerified email at cba.com.au
Gang LiProfessor, Deakin UniversityVerified email at deakin.edu.au
Zhichao Wang (王至超)University of New South Wales, School of Electrical Engineering and TelecommunicationsVerified email at unsw.edu.au
Dung DuongUniversity of Technology SydneyVerified email at student.uts.edu.au
Xiangmeng WangUniversity of Technology SydneyVerified email at student.uts.edu.au
Dianer YuUniversity of Technology SydneyVerified email at uts.edu.au
Yangyang ShuPostdoctoral Research Fellow, University of AdelaideVerified email at adelaide.edu.au
Zhenyu Zhang (张振宇)Baidu Inc.Verified email at baidu.com
zheng fangInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Xianzhi WangUniversity of Technology SydneyVerified email at uts.edu.au
Endong TongBeijing Jiaotong UniversityVerified email at bjtu.edu.cn
Jun PangUniversity of LuxembourgVerified email at uni.lu
Wu ZhiangProfessor of Nanjing Audit UniversityVerified email at seu.edu.cn
Ren LiUniversity of Chinese Academy of SciencesVerified email at mails.ucas.edu.cn
Peng CuiDepartment of Computer Science, Tsinghua UniversityVerified email at tsinghua.edu.cn
Chang XuSenior Lecturer, University of SydneyVerified email at sydney.edu.au
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Dingxian WangEtsyVerified email at etsy.com
Lingqiao LiuSenior Lecturer of the University of AdelaideVerified email at adelaide.edu.au