Get my own profile
Public access
View all36 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Yanjun ZhangLecturer, University of Technology SydneyVerified email at uts.edu.au
Haoyu WANG (王浩宇)Full Professor@HUST <- BUPT <- PKUVerified email at hust.edu.cn
Sun JunProfessor of SCIS, SMUVerified email at smu.edu.sg
Naipeng DongThe University of QueenslandVerified email at uq.edu.au
Zhenkai LiangSchool of Computing, National University of SingaporeVerified email at comp.nus.edu.sg
Mark Huasong MengPostdoc Researcher, TUMVerified email at tum.de
Ryan KoProfessor, Chair & Director – Cyber Security, The University of QueenslandVerified email at uq.edu.au
Yao Guo (郭耀)Professor of Computer Science, Peking UniversityVerified email at pku.edu.cn
Wang KailongHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Yang LiuNanyang Technological UniversityVerified email at ntu.edu.sg
Ye QuanqiNational University of SingaporeVerified email at u.nus.edu
Professor Zi (Helen) HuangUniversity of QueenslandVerified email at itee.uq.edu.au
Fuman XiePhD candidature, The University of QueenslandVerified email at uq.edu.au
Chuan YanUniversity of QueenslandVerified email at uq.edu.au
Xue LiProfessor, The University of QueenslandVerified email at eecs.uq.edu.au
Prateek SaxenaNational University of SingaporeVerified email at comp.nus.edu.sg
Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Lei BuNanjing UniversityVerified email at nju.edu.cn
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Follow
Guangdong Bai
Associate Professor of The University of Queensland
Verified email at uq.edu.au - Homepage