Obtenir mon propre profil
Citée par
Toutes | Depuis 2019 | |
---|---|---|
Citations | 1481 | 1349 |
indice h | 21 | 20 |
indice i10 | 40 | 38 |
Accès public
Tout afficher30 articles
33 articles
disponibles
non disponibles
Sur la base des exigences liées au financement
Coauteurs
- Cong WangDepartment of Computer Science, City University of Hong KongAdresse e-mail validée de cityu.edu.hk
- Xingliang YuanDepartment of Software Systems and Cybersecurity, Faculty of IT, Monash UniversityAdresse e-mail validée de monash.edu
- Xiaohua JIAIEEE Fellow (Computer Society), City University of Hong KongAdresse e-mail validée de gapps.cityu.edu.hk
- Yansong GaoCSIRO's Data61Adresse e-mail validée de data61.csiro.au
- Surya NepalCSIRO’s Data61, AustraliaAdresse e-mail validée de csiro.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityAdresse e-mail validée de rmit.edu.au
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaAdresse e-mail validée de data61.csiro.au
- CHENGJUN CAICity University of Hong KongAdresse e-mail validée de my.cityu.edu.hk
- Helei CuiSchool of Computer Science, Northwestern Polytechnical UniversityAdresse e-mail validée de nwpu.edu.cn
- Jiantao ZhouProfessor, Department of Computer and Information Science, University of MacauAdresse e-mail validée de umac.mo
- Leo Yu ZHANGSnr. Lecturer, School of ICT, Griffith UniversityAdresse e-mail validée de griffith.edu.au
- Qian WangIEEE Fellow, Professor, School of Cyber Science and Engineering, Wuhan UniversityAdresse e-mail validée de whu.edu.cn