Crea il mio profilo
Accesso pubblico
Visualizza tutto27 articoli
34 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Cong WangDepartment of Computer Science, City University of Hong KongEmail verificata su cityu.edu.hk
- Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongEmail verificata su gapps.cityu.edu.hk
- Yansong GaoCSIRO's Data61Email verificata su data61.csiro.au
- Surya NepalCSIRO’s Data61, AustraliaEmail verificata su csiro.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityEmail verificata su rmit.edu.au
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaEmail verificata su data61.csiro.au
- CHENGJUN CAICity University of Hong KongEmail verificata su my.cityu.edu.hk
- Helei CuiSchool of Computer Science, Northwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn
- Jiantao ZhouProfessor, Department of Computer and Information Science, University of MacauEmail verificata su umac.mo
- Leo Yu ZHANGSnr. Lecturer, School of ICT, Griffith UniversityEmail verificata su griffith.edu.au
- Qian WangIEEE Fellow, Professor, School of Cyber Science and Engineering, Wuhan UniversityEmail verificata su whu.edu.cn