Get my own profile
Public access
View all13 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Robert H. DengSingapore Management UniversityVerified email at smu.edu.sg
Yongdong WuVerified email at i2r.a-star.edu.sg
Jian WengProfessor, College of Cyber Security, Jinan UniversityVerified email at jnu.edu.cn
Xuhua DingSingapore Management UniversityVerified email at smu.edu.sg
Haibing LuSanta Clara UniversityVerified email at scu.edu
Fuqiang GuProfessor, College of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
Kourosh KhoshelhamUniversity of MelbourneVerified email at unimelb.edu.au
Dengpan YeWuhan UniversityVerified email at whu.edu.cn
Jialie ShenCity, University of London, UKVerified email at city.ac.uk
Binbin ChenSingapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
Yu ChenProfessor, School of Cyber Science and Technology, Shandong UniversityVerified email at sdu.edu.cn
zhao zhuyannokiaVerified email at vip.sina.com
Baodong Qin (秦宝东)Xi'an University of Posts and Telecommunications
Soonhung HanProfessor of Ocean Systems Engineering, KAISTVerified email at kaist.ac.kr
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu