Get my own profile
Public access
View all39 articles
47 articles
available
not available
Based on funding mandates
Co-authors
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Flavia DelicatoAssociate Professor at the Fluminense Federal UniversityVerified email at ic.uff.br
Paulo F. PiresDell Technologies & Associate Professor of Computer Science, Fluminense Federal University (UFF)Verified email at dell.com
XIAOMIN CHANGThe University of SydneyVerified email at uni.sydney.edu.au
Yucen NanThe University of SydneyVerified email at uni.sydney.edu.au
Weitao XuAssistant Professor at City University of Hong KongVerified email at cityu.edu.hk
Claudio Miceli de FariasProfessor at Instituto Tércio Paccitti de Pesquisas e Aplicações Computacionais and Programa deVerified email at cos.ufrj.br
Chengwen LuoShenzhen UniversityVerified email at szu.edu.cn
Ma JinSydney UniversityVerified email at sydney.edu.au
H. Herbert SongIEEE Fellow, Co-EiC of TII (IF=11.7), University of Maryland, Baltimore CountyVerified email at umbc.edu
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Junwei CaoTsinghua UniversityVerified email at tsinghua.edu.cn
Shuiguang DENGProfessor of Computer Science and Technology, Zhejiang UniversityVerified email at zju.edu.cn
Jose Neuman SouzaProfessor de Computação, Universidade Federal do CearaVerified email at ufc.br
Jianwei YinProfessor of Computer Science and Technology, Zhejiang UniversityVerified email at zju.edu.cn
Tianming ZhaoThe University of SydneyVerified email at uni.sydney.edu.au
Ling WangProfessor of Automation, Tsinghua UniversityVerified email at mail.tsinghua.edu.cn
Zhiguo YuanCity University of Hong KongVerified email at cityu.edu.hk
Paul WatsonProfessor of Computer Science, Newcastle UniversityVerified email at ncl.ac.uk