Get my own profile
Public access
View all10 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Feng BaoHuaweiVerified email at huawei.com
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Haibing LuSanta Clara UniversityVerified email at scu.edu
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
zhuo weiShield Lab @ Singapore HuaweiVerified email at huawei.com
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Beng Chin OOINational University of SingaporeVerified email at comp.nus.edu.sg
Yongdong WuVerified email at i2r.a-star.edu.sg
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Yingjiu LiRipple Professor, Computer Science Department, University of OregonVerified email at uoregon.edu
Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaVerified email at zhejianglab.com
Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl