Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jin Song DongProfessor of Computer Science, National University of Singapore and Griffith UniversityVerified email at nus.edu.sg
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Yang LiuUniversity Leadership Forum Chair Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Yao Guo (郭耀)Professor of Computer Science, Peking UniversityVerified email at pku.edu.cn
Naipeng DongThe University of QueenslandVerified email at uq.edu.au
Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn
Ye QuanqiNational University of SingaporeVerified email at u.nus.edu
Liang GuYale UniversityVerified email at yale.edu
Prateek SaxenaNational University of SingaporeVerified email at comp.nus.edu.sg
Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
Wang KailongNational University of SingaporeVerified email at nus.edu.sg
Yanjun ZhangPostdoctoral Research Fellow, The University of QueenslandVerified email at uq.edu.au
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Andrew PaverdMicrosoft ResearchVerified email at microsoft.com
Pardeep kumarSwansea UniversityVerified email at swansea.ac.uk
Xue LiProfessor, The University of QueenslandVerified email at itee.uq.edu.au
Jianliang WuPurdue UniversityVerified email at purdue.edu
Yinhao XiaoGuangdong University of Finance and EconomicsVerified email at gdufe.edu.cn
Kulani MahadewaLecturer, University of MoratuwaVerified email at uom.lk
Follow