Crea il mio profilo
Accesso pubblico
Visualizza tutto89 articoli
45 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Hua WangProfessor, Victoria UniversityEmail verificata su vu.edu.au
Jinli CaoLa Trobe UniversityEmail verificata su latrobe.edu.au
Siuly SiulyResearch Fellow, Victoria University, AustraliaEmail verificata su vu.edu.au
Guandong Xu, PhDProfessor in Data Science, University of Technology SydneyEmail verificata su uts.edu.au
Guangyan HuangDeakin UniversityEmail verificata su deakin.edu.au
Xiaoxia Yin; Xiao-Xia YinDr of Electronic Engineering, The Univeristy of AdelaideEmail verificata su vu.edu.au
Jiangang MaFederation University, AustraliaEmail verificata su federation.edu.au
Maria E OrlowskaProfesor Informatyki, PJWSTKEmail verificata su pjwstk.edu.pl
Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongEmail verificata su gapps.cityu.edu.hk
Le Sun (Sarah Sun)Nanjing University of Information Science and TechnologyEmail verificata su nuist.edu.cn
Xiaofang ZhouHong Kong University of Science and TechnologyEmail verificata su cse.ust.hk
Chengzheng SunProfessor of Computer Science, Nanyang Technological University, SingaporeEmail verificata su ntu.edu.sg
Yun YangSwinburne University of TechnologyEmail verificata su swin.edu.au
Rui ZhouSwinburne University of Technology, AustraliaEmail verificata su swin.edu.au
Lin LiWuhan University of TechnologyEmail verificata su whut.edu.cn
Khandakar AhmedSenior Lecturer, Victoria UniversityEmail verificata su ieee.org
Jie CaoNanjing University of Finance and EconomicsEmail verificata su nufe.edu.cn
David ChenGriffith UniversityEmail verificata su griffith.edu.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityEmail verificata su rmit.edu.au
Supriya SupriyaPresently Lecturer at Torrens University Australia.Email verificata su torrens.edu.au
Segui
Yanchun Zhang
Guangzhou University, Pengcheng Laboratory,Victoria University
Email verificata su vu.edu.au - Home page