Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Raphaël C.-W. PhanProfessor at Monash UniversityEmail verificata su monash.edu
- Swee-Huay HengMultimedia UniversityEmail verificata su mmu.edu.my
- Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Syh Yuan TanNewcastle UniversityEmail verificata su newcastle.ac.uk
- Y.S. GanSchool of Architecture, Feng Chia UniversityEmail verificata su o365.fcu.edu.tw
- LIONG SZE TENGFENG CHIA UNIVERSITYEmail verificata su mail.fcu.edu.tw
- Iftekhar SalamXiamen University MalaysiaEmail verificata su xmu.edu.my
- Ji-Jian ChinUniversity of PlymouthEmail verificata su plymouth.ac.uk
- Wun-She YapUniversiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Yen-Chang HuangNational University of TainanEmail verificata su mail.nutn.edu.tw
- Geong Sen PohCyber Security AI R & DEmail verificata su ntu.edu.sg
- Thian Song OngMultimedia UniversityEmail verificata su mmu.edu.my
- Tan Lit KenUniversiti Teknologi MalaysiaEmail verificata su utm.my
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Josef PieprzykCSIRO Data61Email verificata su csiro.au
- siew chin chongMultimedia UniversityEmail verificata su mmu.edu.my
- Huo-Chong LingResearcher@RMIT University VietnamEmail verificata su rmit.edu.vn
- Tee ConnieMultimedia UniversityEmail verificata su mmu.edu.my
- Kun-Hong Liuxiamen universityEmail verificata su xmu.edu.cn
- Andrew Teoh Beng JinProfessor of Electrical and Electronic Engineering, Yonsei University, KoreaEmail verificata su yonsei.ac.kr