Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
9 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Matthew R. McKayProfessor, ARC Future Fellow, University of MelbourneEmail verificata su unimelb.edu.au
- Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROEmail verificata su csiro.au
- Stephen HanlyProfessor of EngineeringEmail verificata su mq.edu.au
- Maged ElkashlanAssociate Professor, Queen Mary University of LondonEmail verificata su qmul.ac.uk
- Jinhong YuanProfessor of Electrical Engineering and Telecommunications, University of New South WalesEmail verificata su unsw.edu.au
- Phil YeohUniversity of the Sunshine CoastEmail verificata su usc.edu.au
- Zhuo ChenCSIRO, AustraliaEmail verificata su csiro.au
- Hajime SuzukiCSIROEmail verificata su csiro.au
- I. Vaughan L. ClarksonSchool of Electrical Engineering & Computer Science, Queensland University of TechnologyEmail verificata su qut.edu.au
- Philip WhitingMacquarie University, Dept. of Engineering, North Ryde, NSW AustraliaEmail verificata su mq.edu.au
- Mark HedleyCSIRO Data61Email verificata su csiro.au
- Raymond LouieUniversity of New South WalesEmail verificata su unsw.edu.au
- Linda DavisAssociate Professor, Institute for Telecommunications Research, University of South AustraliaEmail verificata su unisa.edu.au
- Robert HeathCharles Lee Powell Chair in Wireless Communication, University of California, San DiegoEmail verificata su ucsd.edu
- Michael HonigProfessor of Electrical Engineering and Computer Science, Northwestern UniversityEmail verificata su eecs.northwestern.edu
- Nan YangAustralian National UniversityEmail verificata su anu.edu.au
- Chang Kyung SungThales AustraliaEmail verificata su thalesgroup.com.au
- Antonio ForenzaArtemis NetworksEmail verificata su artemis.com
- Malcolm EganInriaEmail verificata su inria.fr
- Jamie EvansUniversity of MelbourneEmail verificata su unimelb.edu.au