Get my own profile
Public access
View all5 articles
19 articles
available
not available
Based on funding mandates
Co-authors
Jeng-Shyang Pan (潘正祥)Nanjing University of Information Science & Technology/Shandong University of Science and TechnologyVerified email at ieee.org
Sisi ZlatanovaProfessor at UNSW, Built EnvironmentVerified email at unsw.edu.au
Wenjie ZhangProfessor of Computer Science and Engineering, University of New South WalesVerified email at cse.unsw.edu.au
Shu-Chuan ChuComputer Science and Engineering, Shandong University of Science and TechnologyVerified email at sdust.edu.cn
Lijun ChangUniversity of SydneyVerified email at sydney.edu.au
Jinjin YanAssociate Professor at Harbin Engineering UniversityVerified email at hrbeu.edu.cn
Abdoulaye A. DiakitéCityGeometrix Pty LtdVerified email at unsw.edu.au
Mitko AleksandrovUniversity of MünsterVerified email at uni-muenster.de
Chia-Chen LinProfessor of Computer Science and Information Engineering, National Chin-Yi University of TechnologyVerified email at ncut.edu.tw
Lu QinUniversity of Technology, SydneyVerified email at uts.edu.au
Tarek GaberSenior Lecturer in Cybersecurity, University of Salford, UK & Professor, Suez Canal University, EGVerified email at salford.ac.uk
Hsiang-Cheh Huang (黃祥哲)National University of KaohsiungVerified email at nuk.edu.tw
Xuemin LinChair Professor at Shanghai Jiaotong UniversityVerified email at cse.unsw.edu.au