Crea il mio profilo
Accesso pubblico
Visualizza tutto60 articoli
20 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Wenjing JiaUniversity of Technology SydneyEmail verificata su uts.edu.au
- Priyadarsi NandaSenior Lecturer at University of Technology, SydneyEmail verificata su uts.edu.au
- Qiang WuAssociate Professor, School of Electrical and Data Engineering, University of Technology SydneyEmail verificata su uts.edu.au
- Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKEmail verificata su napier.ac.uk
- Mian Ahmad JanAssistant Professor, College of Computing and Informatics, University of SharjahEmail verificata su sharjah.ac.ae
- Dr. Aruna JamdagniSchool of Computing and Mats, WesternSydney UniversityEmail verificata su westernsydney.edu.au
- Kenneth Kin-Man LamThe Hong Kong Polytechnic UniversityEmail verificata su polyu.edu.hk
- WEI-CHANG YEHChair Professor, National Tsing-Hua UniversityEmail verificata su ie.nthu.edu.tw
- Changsheng XuProfessor, Institute of Automation, Chinese Academy of SciencesEmail verificata su nlpr.ia.ac.cn
- Keren FuSichuan University, College of Computer ScienceEmail verificata su scu.edu.cn
- suhuai luothe university of newcastleEmail verificata su newcastle.edu.au
- Tao ZhouNanjing University of Science and Technology, IIAI, UNC, SJTUEmail verificata su njust.edu.cn
- Vera Yuk Ying ChungSchool of Computer Science, University of Sydney, AustraliaEmail verificata su it.usyd.edu.au
- Muhammad Abul HasanGreen University of BangladeshEmail verificata su cse.green.edu.bd
- Massimo PiccardiProfessor, University of Technology SydneyEmail verificata su uts.edu.au
- Chen GongProfessor@Nanjing University of Science and TechnologyEmail verificata su njust.edu.cn
- Hamid R ArabniaProfessor Emeritus of Computer Science, University of GeorgiaEmail verificata su uga.edu