Get my own profile
Public access
View all6 articles
32 articles
available
not available
Based on funding mandates
Co-authors
- Jeng-Shyang Pan (潘正祥)Nanjing University of Information Science & Technology/Shandong University of Science and TechnologyVerified email at ieee.org
- Sisi ZlatanovaProfessor at UNSW, Built EnvironmentVerified email at unsw.edu.au
- Wenjie ZhangProfessor of Computer Science and Engineering, University of New South WalesVerified email at cse.unsw.edu.au
- Shu-Chuan ChuSchool of Artificial Intelligence, Nanjing University of Information Science and TechnologyVerified email at nuist.edu.cn
- Lijun ChangUniversity of SydneyVerified email at sydney.edu.au
- Jinjin YanAssociate Professor at Harbin Engineering UniversityVerified email at hrbeu.edu.cn
- Abdoulaye A. DiakitéCityGeometrix Pty LtdVerified email at citygeometrix.com
- Mitko AleksandrovUniversity of MünsterVerified email at uni-muenster.de
- Chia-Chen LinProfessor of Computer Science and Information Engineering, National Chin-Yi University of TechnologyVerified email at ncut.edu.tw
- Lu QinUniversity of Technology, SydneyVerified email at uts.edu.au
- Tarek GaberSenior Lecturer in Cybersecurity, University of Salford, UK & Professor, Suez Canal University, EGVerified email at salford.ac.uk
- Hsiang-Cheh Huang (黃祥哲)National University of KaohsiungVerified email at nuk.edu.tw
- Xuemin LinChair Professor at Shanghai Jiaotong UniversityVerified email at cse.unsw.edu.au