Get my own profile
Public access
View all138 articles
50 articles
available
not available
Based on funding mandates
Co-authors
Xiaojing HuangProfessor of ICT, University of Technology SydneyVerified email at uts.edu.au
Pei-Yuan QinUniversity of Technology, SydneyVerified email at uts.edu.au
J. Andrew ZhangProf, University of Technology SydneyVerified email at uts.edu.au
Shu-Lin ChenUniversity of Technology SydneyVerified email at uts.edu.au
Richard W. ZiolkowskiProfessor Emeritus, University of ArizonaVerified email at arizona.edu
Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
He ZhuCommonwealth Scientific and Industrial Research Organisation (CSIRO)Verified email at csiro.au
Kai WuLecturer, GBDTC, SEDE, FEIT, UTSVerified email at uts.edu.au
Jia DuCSIROVerified email at csiro.au
Trevor S. BirdAntengenuityVerified email at ieee.org
Hai-Han SunAssistant Professor, University of Wisconsin-MadisonVerified email at wisc.edu
Jose Luis Gomez TorneroTechnical University of CartagenaVerified email at upct.es
Debabrata Kumar KarmokarUniversity of South AustraliaVerified email at ieee.org
Val DyadyukCSIROVerified email at csiro.au
Xu WangSchool of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
Robert HeathCharles Lee Powell Chair in Wireless Communication, University of California, San DiegoVerified email at ucsd.edu
Maral AnsariResearch Engineer, CSIROVerified email at csiro.au
John BuntonCSIROVerified email at csiro.au
Jinhong YuanProfessor of Electrical Engineering and Telecommunications, University of New South WalesVerified email at unsw.edu.au
Anh Tuyen LeUniversity of Technology SydneyVerified email at uts.edu.au
Follow![Prof. Y. Jay Guo](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=QyfY8Z8AAAAJ&citpid=2)