Get my own profile
Public access
View all29 articles
27 articles
available
not available
Based on funding mandates
Co-authors
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Dusit (Tao) NiyatoNanyang Technological University (NTU)Verified email at ntu.edu.sg
Anupam ChattopadhyayAssociate Professor, SCSE, SPMS, NTU, SingaporeVerified email at ntu.edu.sg
Chi-Hung ChiCSIROVerified email at csiro.au
Mengmeng YangData61, CSIRO, AustraliaVerified email at data61.csiro.au
Sumei SunInstitute for Infocomm ResearchVerified email at i2r.a-star.edu.sg
Yang ZhaoAgency for Science, Technology and Research (A*STAR)Verified email at simtech.a-star.edu.sg
Muhammad Baqer MollahECE @ UMass DartmouthVerified email at umassd.edu
Xiuhua LiProfessor, School of Big Data & Software Engineering, Chongqing UniversityVerified email at cqu.edu.cn
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Andreas BurgEPFL - Telecommunications Circuits LaboratoryVerified email at epfl.ch
Xiaohu You东南大学信息通信教授Verified email at seu.edu.cn
Siu-Ming YiuProfessor of Computer Science, The University of Hong KongVerified email at cs.hku.hk