Get my own profile
Public access
View all32 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
- Yanjun ZhangLecturer, University of Technology SydneyVerified email at uts.edu.au
- Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
- Naipeng DongThe University of QueenslandVerified email at uq.edu.au
- Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn
- Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
- Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
- Yao Guo (郭耀)Professor of Computer Science, Peking UniversityVerified email at pku.edu.cn
- Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
- Wang KailongHuazhong University of Science and TechnologyVerified email at hust.edu.cn
- Ye QuanqiNational University of SingaporeVerified email at u.nus.edu
- Mark Huasong MengResearch Scientist, Institute for Infocomm Research, A*STARVerified email at i2r.a-star.edu.sg
- Liang GuYale UniversityVerified email at yale.edu
- Prateek SaxenaNational University of SingaporeVerified email at comp.nus.edu.sg
- Xue LiProfessor, The University of QueenslandVerified email at eecs.uq.edu.au
- Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Lei BuNanjing UniversityVerified email at nju.edu.cn
- Professor Zi (Helen) HuangUniversity of QueenslandVerified email at itee.uq.edu.au
- Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
- Andrew PaverdMicrosoftVerified email at microsoft.com
Follow
Guangdong Bai
Associate Professor of The University of Queensland
Verified email at uq.edu.au - Homepage