Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mahmood Yousefi-AzarMacquarie UniversityVerified email at hdr.mq.edu.au
Vijay VaradharajanThe University if NewcastleVerified email at newcastle.edu.au
Kevin Ho-ShonMacquarie UniversityVerified email at ho-shon.com
Omid NezamiMacquarie UniversityVerified email at mq.edu.au
Mark DrasProfessor of Computing, Macquarie UniversityVerified email at mq.edu.au
Prof. Shiping ChenCSIRO Data61, AustraliaVerified email at data61.csiro.au
Deborah RichardsProfessor, Department of Computing, Macquarie UniversityVerified email at mq.edu.au
Sarvnaz KarimiCSIROVerified email at csiro.au
Sonit SinghSchool of Computer Science and Engineering, UNSW, AustraliaVerified email at unsw.edu.au
Uday TupakulaUniversity of New EnglandVerified email at une.edu.au
Stephen WanData61 CSIROVerified email at data61.csiro.au
Mehmet A. OrgunSchool of Computing, Macquarie UniversityVerified email at mq.edu.au
Manolya Kavakli-ThorneProfessor of Gamification & Simulation Technology, Aston University, UKVerified email at aston.ac.uk
Tahereh Hassanzadeh, Ph.DSenior Research Associate at UNSWVerified email at unsw.edu.au
Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
Xi ZhengMacquarie UniversityVerified email at mq.edu.au
Anthony SloaneHonorary Associate Professor, Macquarie UniversityVerified email at mq.edu.au
Jason (Minhui) XueSenior Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
H. T. KungProfessor, Harvard UniversityVerified email at harvard.edu
Peter AndersonHead of Research, Applied AI at Balyasny Asset ManagementVerified email at bamfunds.com