Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Swee-Huay HengMultimedia UniversityEmail verificata su mmu.edu.my
- Ji-Jian ChinUniversity of PlymouthEmail verificata su plymouth.ac.uk
- Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Raphaël C.-W. PhanProfessor at Monash UniversityEmail verificata su monash.edu
- Wei-Chuen YauXiamen University MalaysiaEmail verificata su xmu.edu.my
- Geong Sen PohCyber Security AI R & DEmail verificata su ntu.edu.sg
- Wun-She YapUniversiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Jin ZheProfessor, Anhui UniversityEmail verificata su ahu.edu.cn
- Iftekhar SalamXiamen University MalaysiaEmail verificata su xmu.edu.my
- Huo-Chong LingResearcher@RMIT University VietnamEmail verificata su rmit.edu.vn
- Rouzbeh BehniaUniversity of South FloridaEmail verificata su usf.edu
- Yvonne Kam Hwei SynMultimedia UniversityEmail verificata su mmu.edu.my
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Chee Siang WongUniversiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Andrew Teoh Beng JinProfessor of Electrical and Electronic Engineering, Yonsei University, KoreaEmail verificata su yonsei.ac.kr