Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
- Josef PieprzykCSIRO Data61Verified email at csiro.au
- Leonie SimpsonAssociate Professor, Faculty of Science, Queensland University of Technology. Brisbane, AUSTRALIAVerified email at qut.edu.au
- Edward DawsonEmeritus Professor Queensland University of TechnologyVerified email at qut.edu.au
- Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
- Madhusudan SinghLong Island UniversityVerified email at liu.edu
- Pardeep kumarWarwick Manufacturing Group, University of Warwick, UKVerified email at warwick.ac.uk
- Janaka AlawatugodaRabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, AustraliaVerified email at ra.ac.ae
- Kamran Siddique, SMIEEEDepartment of Computer Science and Engineering, University of Alaska, USAVerified email at alaska.edu
- Muammer TürkoğluSamsun ÜniversitesiVerified email at samsun.edu.tr
- Abdulkadir SengurProfessor of Electrical-Electronics Engineering, Firat UniversityVerified email at firat.edu.tr
- Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
- Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
- Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
- Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
- Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
- Geong Sen PohCyber Security AI R & DVerified email at ntu.edu.sg
- Mohammad Arif Sobhan BhuiyanXiamen University MalaysiaVerified email at xmu.edu.my
- Kelvin J. A. OoiXiamen University MalaysiaVerified email at xmu.edu.my
- Lee HoonJaeProf. of Dept. Information Security, Dongseo Univ.Verified email at dongseo.ac.kr