Crea il mio profilo
Accesso pubblico
Visualizza tutto30 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jin Song DongProfessor of Computer Science, National University of SingaporeEmail verificata su nus.edu.sg
- Yanjun ZhangLecturer, University of Technology SydneyEmail verificata su uts.edu.au
- Sun JunProfessor of SCIS, SMUEmail verificata su smu.edu.sg
- Naipeng DongThe University of QueenslandEmail verificata su uq.edu.au
- Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUEmail verificata su hust.edu.cn
- Zhenkai LiangSchool of Computing, National University of SingaporeEmail verificata su comp.nus.edu.sg
- Yang LiuNanyang Technological UniversityEmail verificata su ntu.edu.sg
- Yao Guo (郭耀)Professor of Computer Science, Peking UniversityEmail verificata su pku.edu.cn
- Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandEmail verificata su uq.edu.au
- Ye QuanqiNational University of SingaporeEmail verificata su u.nus.edu
- Wang KailongHuazhong University of Science and TechnologyEmail verificata su hust.edu.cn
- Liang GuYale UniversityEmail verificata su yale.edu
- Mark Huasong MengResearch Scientist, Institute for Infocomm Research, A*STAREmail verificata su i2r.a-star.edu.sg
- Prateek SaxenaNational University of SingaporeEmail verificata su comp.nus.edu.sg
- Xue LiProfessor, The University of QueenslandEmail verificata su eecs.uq.edu.au
- Xiapu LuoThe Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
- Andrew MartinProfessor of Systems Security, University of OxfordEmail verificata su cs.ox.ac.uk
- Andrew PaverdMicrosoftEmail verificata su microsoft.com
- Pardeep kumarSwansea UniversityEmail verificata su swansea.ac.uk
- Lei BuNanjing UniversityEmail verificata su nju.edu.cn
Segui
Guangdong Bai
Associate Professor of The University of Queensland
Email verificata su uq.edu.au - Home page