Get my own profile
Public access
View all39 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Victor SanchezAssociate Professor, Dept. of Computer Science, University of Warwick, UKVerified email at dcs.warwick.ac.uk
Yu GuanAssociate Professor, University of Warwick, UKVerified email at warwick.ac.uk
Roberto LeyvaUniversity of WarwickVerified email at warwick.ac.uk
Richard JiangSenior Lecturer and Associate Professor, Lancaster UniversityVerified email at lancaster.ac.uk
Ching-Chun ChangNational Institute of InformaticsVerified email at nii.ac.jp
Shan LinResearch Fellow, Nanyang Technological UniversityVerified email at ntu.edu.sg
Ahmed BouridaneUniversity of SharjahVerified email at sharjah.ac.ae
Ruizhe LiAmazon TTS ResearchVerified email at amazon.co.uk
Alaa O. KhadidosAssociate Professor, Department of Information Systems, Faculty of Computing & InformationVerified email at kau.edu.sa
Yijun QuanResearch Fellow, University of WarwickVerified email at warwick.ac.uk
Fabio RoliProfessor, University of Genova, ItalyVerified email at unige.it
Ligang HeReader of Computer Science, University of Warwick, United KingdomVerified email at warwick.ac.uk
Alex KotNanyang Technological UniversityVerified email at ntu.edu.sg
Professor Asoke K. NandiChair and Head of Electronic and Computer EngineeringVerified email at brunel.ac.uk
Ning JiaDurham UniversityVerified email at durham.ac.uk
Roberto CaldelliResearcher at CNIT and Full Prof. at Universitas MercatorumVerified email at unifi.it
Haoliang LiDepartment of Electrical Engineering, City University of Hong KongVerified email at cityu.edu.hk
Alan Wee-Chung LiewProfessor, School of ICT, Griffith UniversityVerified email at griffith.edu.au
Fei PengHunan UniversityVerified email at hnu.edu.cn
Riccardo SattaMachine Learning LeadVerified email at sonicjobs.com
Follow
Chang-Tsun Li
Professor of Cyber Security at Deakin University, Australia
Verified email at deakin.edu.au - Homepage