Get my own profile
Public access
View all30 articles
23 articles
available
not available
Based on funding mandates
Co-authors
Wei NiPrincipal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Eduardo TovarProfessor, ISEP, Polytechnic Institute of Porto, Researcher CISTERVerified email at isep.ipp.pt
salil kanhereProfessor, UNSW Sydney, AustraliaVerified email at unsw.edu.au
Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Verified email at mbzuai.ac.ae
Prof. Sanjay JhaProfessor, School of Computer Science and Engineering, University of New South WalesVerified email at cse.unsw.edu.au
Chau YuenIEEE Fellow, Highly Cited Researcher, Nanyang Technological UniversityVerified email at ntu.edu.sg
yousef emamiFEUP, University of PortoVerified email at fe.up.pt
Falko DresslerTechnische Universität BerlinVerified email at ccs-labs.org
Abbas Jamalipour, Fellow IEEE, Fello...Professor of Ubiquitous Mobile Networking, The University of SydneyVerified email at ieee.org
Bo WeiSenior Lecturer (Associate Professor) in Computer Science, Newcastle UniversityVerified email at newcastle.ac.uk
Xin WangFudan UniversityVerified email at fudan.edu.cn
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
Mehran AbolhasanProfessor, University of Technology SydneyVerified email at uts.edu.au
Lingjie DuanAssociate Professor, Singapore University of Technology and DesignVerified email at sutd.edu.sg
Jianwei NiuBeihang UniversityVerified email at buaa.edu.cn
Tanmay ChaturvediEmbedded Software Engineer at Apple Inc.Verified email at colorado.edu
Harrison KurunathanCISTER research centerVerified email at isep.ipp.pt
Zhu HanUniversity of HoustonVerified email at uh.edu
Brano KusyAutonomous Systems, CSIRO, AustraliaVerified email at csiro.au
Raja JurdakProfessor, Queensland University of Technology (QUT), AustraliaVerified email at qut.edu.au