Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ee-Chien ChangNational University of SingaporeEmail verificata su comp.nus.edu.sg
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg
- Hoon Wei LimSingtelEmail verificata su singtel.com
- Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongEmail verificata su cityu.edu.hk
- Anjia YangJinan UniversityEmail verificata su my.cityu.edu.hk
- Chengfang FangPrincipal Researcher, Huawei InternationalEmail verificata su huawei.com
- Biplab SikdarProfessor, National University of SingaporeEmail verificata su nus.edu.sg
- Muhammad Naveed AmanUniversity of Nebraska-LincolnEmail verificata su unl.edu
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Cheng-Kang ChuHuawei InternationalEmail verificata su huawei.com
- Geong Sen PohCyber Security AI R & DEmail verificata su ntu.edu.sg
- Jian WengProfessor, College of Cyber Security, Jinan UniversityEmail verificata su jnu.edu.cn
- Zhoujun LiBeihang UniversityEmail verificata su buaa.edu.cn
- Jianting NingSingapore Management UniversityEmail verificata su smu.edu.sg
- Dr. Kaitai LiangCybersecurity Group, EMCS, TU DELFTEmail verificata su tudelft.nl
- Fan (Terry) ZhangZhejiang UniversityEmail verificata su zju.edu.cn
- Yiwen GAONanjing University of Science and TechnologyEmail verificata su njust.edu.cn
- Stephane BressanNational University of SingaporeEmail verificata su nus.edu.sg
- Zhiyong HuangAssociate Professor, Department of Computer Science, School of Computing, NUSEmail verificata su comp.nus.edu.sg
- Joseph LiuProfessor of Law, Boston CollegeEmail verificata su bc.edu