Get my own profile
Public access
View all17 articles
11 articles
available
not available
Based on funding mandates
Co-authors
Ding Wang(汪 定)College of Cyber Science, Nankai University, Tianjin 300350, ChinaVerified email at nankai.edu.cn
Vishal SharmaQueen's University Belfast, UKVerified email at qub.ac.uk
Paweł SzałachowskiVerified email at google.com
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Saraju P. MohantyProfessor, University of North TexasVerified email at unt.edu
Steven GalbraithProfessor of Pure Mathematics, University of Auckland, NZVerified email at math.auckland.ac.nz
Zheng YANGSouthwest UniversityVerified email at swu.edu.cn
Kun HeWuhan UniversityVerified email at whu.edu.cn
Jing ChenProfessor, Wuhan UniversityVerified email at whu.edu.cn
Hong-Sheng ZhouVirginia Commonwealth UniversityVerified email at vcu.edu
Chang ChoiAssistant Professor, Department of Computer Engineering, Gachon UniversityVerified email at gachon.ac.kr
Minghao ZhaoEast China Normal UniversityVerified email at mails.tsinghua.edu.cn
Ivan HomoliakResearch Scientist, Brno University of TechnologyVerified email at fit.vutbr.cz
Chunpeng GeUniversity of Wollongong, Research FellowVerified email at uow.edu.au
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Junming KeUniversity of TartuVerified email at ut.ee
Daniël ReijsbergenNanyang Technological UniversityVerified email at ntu.edu.sg
Prosanta GopeAssistant Professor, Department of Computer Science, University of SheffieldVerified email at sheffield.ac.uk
Sarad VenugopalanInformation Security Researcher & DeveloperVerified email at sec.ethz.ch
Jianting NingSingapore Management UniversityVerified email at smu.edu.sg