Get my own profile
Public access
View all10 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
- Feng BaoHuaweiVerified email at huawei.com
- Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Haibing LuSanta Clara UniversityVerified email at scu.edu
- Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
- zhuo weiShield Lab @ Singapore HuaweiVerified email at huawei.com
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Beng Chin OOINational University of SingaporeVerified email at comp.nus.edu.sg
- Yongdong WuVerified email at i2r.a-star.edu.sg
- Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaVerified email at zhejianglab.com
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTVerified email at tudelft.nl