Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jianting NingSingapore Management UniversityEmail verificata su smu.edu.sg
- Ji-Jian ChinUniversity of PlymouthEmail verificata su plymouth.ac.uk
- Kok-Lim Alvin YauProfessor, UTAR, MalaysiaEmail verificata su utar.edu.my
- Raphaël C.-W. PhanProfessor at Monash UniversityEmail verificata su monash.edu
- Wei-Chuen YauXiamen University MalaysiaEmail verificata su xmu.edu.my
- Keith M. MartinRoyal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Syh Yuan TanNewcastle UniversityEmail verificata su newcastle.ac.uk
- Muhammad Reza Z'abaMIMOS BerhadEmail verificata su mimos.my
- Swee-Huay HengMultimedia UniversityEmail verificata su mmu.edu.my
- Wun-She YapUniversiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Huo-Chong LingResearcher@RMIT University VietnamEmail verificata su rmit.edu.vn
- Iftekhar SalamXiamen University MalaysiaEmail verificata su xmu.edu.my
- Junaid QadirProfessor of Computer Engineering, Qatar University (QU)Email verificata su qu.edu.qa
- Qiang NiProfessor, Lancaster UniversityEmail verificata su lancaster.ac.uk
- Wai Kong LeeGachon UniversityEmail verificata su gachon.ac.kr
- Peter KomisarczukRoyal Holloway, University of London, Information Security Group (ISG)Email verificata su rhul.ac.uk
- David ChiengAssociate Professor of Electrical and Electronic EngineeringEmail verificata su nottingham.edu.cn